PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Three-Phase Lossless Data Hiding Method for the VQ Index Table

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Hiding Data in a cover image often applies a steganographic technique that makes the stego image appear as similar to the original cover image as possible. Conventional VQ-based (vector quantization) steganographic methods typically involve codeword replacements to hide secret bits. Such replacements may cause serious distortion or a perceptible block effect on the stego image. In this paper, we propose a three-phase steganographic method for the VQ index table. Instead of applying codeword replacements, the proposed method uses different coding schemes-SOC, SMVQ, and VQ-to imply the secret bits. The quality of the stego image generated by the proposed method is completely equal to that of the original cover image (i.e., the VQ cover image). Experimental results have shown that the proposed method has the best stego image quality compared with other methods. In addition, the proposed method provides adaptive embedding capacity and compression bit rate according to predefined thresholds.
Wydawca
Rocznik
Strony
1--13
Opis fizyczny
bibliogr. 16 poz., fot., tab., wykr.
Twórcy
autor
autor
autor
  • Department of Information Engineering and Computer Science Feng Chia University, Taichung, Taiwan, 40724, R.O.C., ccc@cs.ccu.edu.tw
Bibliografia
  • [1] W. Bender, D. Gruhl, N. Morimoto, and A. Lu,"Techniques for data hiding," IBM Systems Journal, vol. 35, no. 3&4, 1996, pp. 313-336.
  • [2] C. K. Chan and L. M. Cheng,"Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37, no. 3, 2004, pp. 469-474.
  • [3] C. C. Chang, J. Y. Hsiao, and C. S. Chan, "Finding optimal LSB substitution in image hiding by dynamic programming strategy," Pattern Recognition, vol. 36, no. 7, 2003, pp. 1583-1595.
  • [4] C. C. Chang, M. H. Lin, and Y. C. Hu, "A fast and secure image hiding scheme based on LSB substitution," International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, 2002, pp. 399-416.
  • [5] C. C. Chang, W. L. Tai, and C. C. Lin, "A reversible data hiding scheme with modified side match vector quantization," Proceedings of IEEE 19th International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, 2005, pp. 947-952.
  • [6] C. C. Chang and W. C. Wu, "A steganographic method for hiding secret data using side match vector quantization," IEICE Transactions on Information and Systems, vol. E88-D, no. 9, 2005, pp. 2159-2167.
  • [7] A. Gersho and R.M. Gray, "Vector quantization and signal compression," Kluwer Academic Publishers, 1992.
  • [8] R. M. Gray, "Vector quantization," IEEE ASSP Magazine, 1984, pp. 4-29.
  • [9] C. H. Hsieh and J. C. Tsai, "Lossless compression of VQ index with search-order coding," IEEE Transactions on Image Processing, vol. 5, no. 11, 1996, pp. 1579-1582.
  • [10] M. Jo and H. D. Kim,, "A digital image watermarking scheme based on vector quantization," IEICE Transactions on Information and Systems, vol. E85-D, no. 6, 2002, pp. 1054-1056.
  • [11] T. Kim, "Side match and overlap match vector quantizers for images," IEEE Transactions on Image Processing, vol. 1, no. 2, 1992, pp. 170-185.
  • [12] Y. C. Lin and C. C. Wang, "Digital images watermarking by vector quantization," Proceedings of National Computer Symposium, Taichung, Taiwan, 1999, pp. 76-87.
  • [13] Y. Linde, A. Buzo, and R. M. Gary, "An algorithm for vector quantization design," IEEE Transactions on Communications, vol. 28, no. 4, 1980, pp. 84-95.
  • [14] R. G. V. Schyndel, A. Z. Tirkel, and C. F. Osborne, "A digital watermark," Proceedings of the IEEE International Conference on Image Processing (ICIP-94), Austin, Texas, 1994, pp. 86-90.
  • [15] R. Z. Wang, C. F. Lin, and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, vol. 34, no. 3, 2001, pp. 671-683.
  • [16] Y. H. Yu, C. C. Chang, and Y. C. Hu, "Hiding secret data in images via predictive coding," Pattern Recognition, vol. 38, no. 5, 2005, pp. 691-705.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS5-0014-0054
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.