Browse > Article
http://dx.doi.org/10.3837/tiis.2015.08.013

A Lossless Data Hiding Scheme for VQ Indexes Based on Joint Neighboring Coding  

Rudder, Andrew (Department of Computing and Information Technology, Faculty of Science and Technology, The University of the West Indies, St. Augustine, Trinidad and Tobago)
Kieu, The Duc (Department of Computing and Information Technology, Faculty of Science and Technology, The University of the West Indies, St. Augustine, Trinidad and Tobago)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.8, 2015 , pp. 2984-3004 More about this Journal
Abstract
Designing a new reversible data hiding technique with a high embedding rate and a low compression rate for vector quantization (VQ) compressed images is encouraged. This paper proposes a novel lossless data hiding scheme for VQ-compressed images based on the joint neighboring coding technique. The proposed method uses the difference values between a current VQ index and its left and upper neighboring VQ indexes to embed n secret bits into one VQ index, where n = 1, 2, 3, or 4. The experimental results show that the proposed scheme achieves the embedding rates of 1, 2, 3, and 4 bits per index (bpi) with the corresponding average compression rates of 0.420, 0.483, 0.545, and 0.608 bit per pixel (bpp) for a 256 sized codebook. These results confirm that our scheme performs better than other selected reversible data hiding schemes.
Keywords
Data hiding; reversible data embedding; watermarking; steganography; vector quantization;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T.D. Kieu and S. Ramroach, “A reversible steganographic scheme for VQ indices based on joint neighboring coding,” Expert Systems with Applications, vol. 42, no. 2, pp. 713-722, 2015. Article (CrossRef Link)   DOI
2 Y. Linde, A. Buzo, and R.M. Gray, “An algorithm for vector quantizer design,” IEEE Transactions on Communications, vol. 28, no. 1, pp. 84-95, 1980. Article (CrossRef Link)   DOI
3 C.C Chang, T.D. Kieu, and Y.C Chou, Reversible information hiding for VQ indices based on locally adaptive coding,” Journal of Visual Communication and Image Representation, vol. 20, no. 1, pp. 57-64, 2009. Article (CrossRef Link)   DOI
4 C.H. Yang and Y.C. Lin, “Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding,” Journal of Visual Communication and Image Representation, vol. 21, no. 4, pp. 334-342, 2010. Article (CrossRef Link)   DOI
5 C.C. Chang, T.S. Nguyen, and C.C Lin, “A reversible data hiding for VQ indices using locally adaptive coding,” Journal of Visual Communication and Image Representation, vol. 22, no. 7, pp. 664-672, 2011. Article (CrossRef Link)   DOI
6 T.D. Kieu, A. Rudder, and W. Goodridge, “A reversible steganographic scheme for VQ indices based on locally adaptive coding,” Journal of Visual Communication and Image Representation, vol. 25, no. 6, pp. 1378-1386, 2014. Article (CrossRef Link)   DOI
7 R.M. Gray, “Vector quantization,” IEEE ASSP Magazine, vol. 1, no. 2, pp. 4-29, 1984. Article (CrossRef Link)   DOI
8 C.C. Chang, T.D. Kieu, and W.C. Wu, “A lossless data embedding technique by joint neighboring coding,” Pattern Recognition, vol. 42, no. 7, pp. 1597-1603, 2009. Article (CrossRef Link)   DOI
9 J.X. Wang and Z.M. Lu, “A path optional lossless data hiding scheme based on VQ joint neighboring coding,” Information Sciences, vol. 179, no. 19, pp. 3332-3348, 2009. Article (CrossRef Link)   DOI
10 D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721-730, 2007. Article (CrossRef Link)   DOI
11 J.D. Lee, Y.H. Chiou, and J.M. Guo, “Lossless data hiding for VQ indices based on neighboring correlation,” Information Sciences, vol. 221, pp. 419-438, 2013. Article (CrossRef Link)   DOI
12 W. Hong and T.S. Chen, “A novel data embedding method using adaptive pixel pair matching,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 176-184, 2012. Article (CrossRef Link)   DOI
13 C.C. Chang, P.Y. Pai, C.M. Yeh, and Y.K Chan, “A high payload frequency-based reversible image hiding method,” Information Sciences, vol. 180, no. 11, pp. 2286-2298, 2010. Article (CrossRef Link)   DOI
14 J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 831-841, 2003. Article (CrossRef Link)   DOI
15 A.M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol. 13, no. 8, pp. 1147-1156, 2004. Article (CrossRef Link)   DOI
16 X. Zhang, S. Wang, Z. Qian, and G. Feng, “Reversible fragile watermarking for locating tampered blocks in JPEG images,” Signal Processing, vol. 90, no. 12, pp. 3026-3036, 2010. Article (CrossRef Link)   DOI
17 J.S. Pan, M.T. Sung, H.C. Huang, and B.Y. Liao, “Robust VQ-based digital watermarking for the memoryless binary symmetric channel,” IEICE Transactions on Fundamentals, vol. E-87A, no. 7, pp. 1839-1841, 2004. Article (CrossRef Link)
18 I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital watermarking and steganography, 2nd Edition, Morgan Kauffman, 2007. Article (CrossRef Link)
19 C.H. Yang and Y.C. Lin, “Reversible data hiding of a VQ index table based on referred counts,” Journal of Visual Communication and Image Representation, vol. 20, no. 6, pp. 399-407, 2009. Article (CrossRef Link)   DOI
20 M.A. Wright, “The advanced encryption standard,” Network Security 2001, vol. 10, pp. 11-13, 2001. Article (CrossRef Link)   DOI
21 R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978. Article (CrossRef Link)   DOI
22 F. Peng, X. Li, and B. Yang, “Improved PVO-based reversible data hiding,” Digital Signal Processing, vol. 25, pp. 255-265, 2014. Article (CrossRef Link)   DOI
23 W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3-4, pp. 313-336, 1996. Article (CrossRef Link)   DOI
24 F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information hiding - a survey," in Proc. of IEEE Special Issue on Protection of Multimedia Content, vol. 87, no. 7, pp. 1062-1078, 1999. Article (CrossRef Link)
25 Y. Hu, H. Lee, and J. Li, “DE-based reversible data hiding with improved overflow location map,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 2, pp. 250-260, 2009. Article (CrossRef Link)   DOI
26 D. Coltuc, “Low distortion transform for reversible watermarking,” IEEE Transactions on Image Processing, vol. 21, no. 1, pp. 412-417, 2012. Article (CrossRef Link)   DOI
27 C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 488-497, 2008. Article (CrossRef Link)   DOI
28 R.M. Davis, “The data encryption standard in perspective,” IEEE Communications Magazine, vol. 16, no. 6, pp. 5-9, 1978. Article (CrossRef Link)   DOI