PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Reversible Steganography for BTC-compressed Images

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Reversible steganography becomes a popular hiding problem in recent years. A reversible steganographicmethod can reconstruct an original image without loss from the stego-image after extracting the embedded data. Unlike traditional reversible methods in which data is hidden in uncompressed images, we propose a reversible scheme for BTC (block truncation coding)- compressed images. The secret data embedded in the compressed image are more difficult to detect than in the uncompressed image. To achieve reversibility, the properties of side matching and BTCcompressed code are applied. The experimental results show that the proposed method is feasible for BTC-compressed images and can embed one more bit in each BTC-encoded block.
Wydawca
Rocznik
Strony
121--134
Opis fizyczny
Bibliogr. 31 poz., fot., tab.
Twórcy
autor
autor
autor
  • Department of Computer Science and Information Engineering, Feng Chia University, Taichung 40724, Taiwan, R.O.C., ccc@cs.ccu.edu.tw
Bibliografia
  • [1] C. C. Chang and H. W. Tseng: A steganographic method for digital images using side-match, Pattern Recognition Letters, vol. 25, no. 12, pp. 1431-1437, 2004.
  • [2] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber: Reversible data hiding, Proceedings of IEEE International Conference on Image Processing, Rochester, NY, pp. 157-160, 2002.
  • [3] C. C. Chang, T. S. Chen, and L. Z. Chung: A colour image compression scheme based on two-layer absolute moment block truncation coding, Imaging Science Journal, vol. 48, no. 22, pp. 53-62, 2000.
  • [4] C. C. Chang, T. S. Chen, and L. Z. Chung: A steganographicmethod based upon JPEG and quantization table modification, Information Sciences, vol. 141, no. 1, pp. 123-138, 2002.
  • [5] C. C. Chang, J. Y. Hsiao, and C. S. Chan: Finding optimal LSB substitution in image hiding by dynamic programming strategy, Pattern Recognition, vol. 36, no. 7, pp. 1583-1595, 2003.
  • [6] C. C. Chang, W. L. Tai, and C. C. Lin: A reversible data hiding scheme with modified side match vector quantization, Proceedings of IEEE 19th International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, pp. 947-952, 2005.
  • [7] J. C. Chuang and C. C. Chang: An information hiding scheme based upon block truncation coding, International Journal of Computers and Applications, no.
  • [8] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon: Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997.
  • [9] B. V. Dasarathy: Image data compression: block truncation coding. Los Alamitos, CA: IEEE Computer Society Press, 1995.
  • [10] B. C. Dhara and B. Chanda: Block truncation coding using pattern fitting, Pattern Recognition, vol. 37, no. 11, pp. 2131-2139, 2004.
  • [11] S. Dumitrescu and X. Wu: A new framework of LSB steganalysis of digital media, IEEE Transactions on Signal Processing, Supplement on Secure Media, vol. 53, no. 10, pp. 3936-3947, 2005.
  • [12] S. Dumitrescu, X. Wu, and Z.Wang: Detection of LSB steganography via sample pair analysis, IEEE Transactions on Signal Processing, vol. 51, no. 7, pp. 1995-2007, 2003.
  • [13] E. J. Delp and O. R. Mitchell: Image compression using block truncation coding, IEEE Transactions on Communications, vol. 27, no. 9, pp. 1335-1341, 1979.
  • [14] S. Emmanuel, H. C. Kiang, and A. Das: A reversible watermarking scheme for JPEG-2000 compressed images, Proceedings of IEEE International Conference on Multimedia and Expo (ICME), Amsterdam, The Netherlands, pp. 69-72, 2005.
  • [15] J. Fridrich, M. Goljan, and R. Du: Lossless data embedding-new paradigm in digital watermarking, Special Issue on Emerging Applications of Multimedia Data Hiding, vol. 2002, no. 2, pp. 185-196, 2002.
  • [16] R. M. Gray: Vector quantization, in IEEE ASSP Magazine, 1984, pp. 4-29.
  • [17] Y. C. Hu and C. C. Chang: Edge detection using block truncation coding, International Journal of Pattern Recognition and Artificial Intelligence, vol. 17, no. 6, pp. 951-966, 2003.
  • [18] S. Katzenbeisser and F. A. P. Petitcolas: Information hiding techniques for steganography and digital watermarking. Norwood,Massachusetts: Artech House, 2000.
  • [19] T. Kim: Sidematch and overlapmatch vector quantizers for images, IEEE Transactions on Image Processing, vol. 1, no. 2, pp. 170-185, 1992.
  • [20] Z. M. Lu and S. H. Sun: Digital image watermarking technique based on vector quantization, Electronics Letters, vol. 36, no. 4, pp. 303-305, 2000.
  • [21] B. Macq: Lossless multiresolution transform for image authenticating watermarking, Proceedings of EUSIPCO, Tampere, Finland, pp. 533-536, 2000.
  • [22] S. C. Pei and C. M. Cheng: A novel block truncation coding of color images using a quaternion-momentpreserving principle, IEEE Transactions on Communications, vol. 45, no. 5, pp. 583-595, 1997.
  • [23] C. I. Podilchuk and E. J. Delp: Digital watermarking: algorithms and applications, IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 33-46, 2001.
  • [24] G. Qiu: Color image indexing using BTC, IEEE Transactions on Image Processing, vol. 12, no. 1, pp. 93-101, 2003.
  • [25] Y. V. R. Rao and C. Eswaran: New bit rate reduction techniques for block truncation coding, IEEE Transactions on Communications, vol. 44, no. 10, pp. 1247-1250, 1996.
  • [26] J. Tian: Reversible data embedding using a difference expansion, IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, 2003.
  • [27] P. Y. Tsai, C. C. Chang, and Y. C. Hu: An adaptive two-stage edge detection scheme for digital color images, Real-Time Imaging, vol. 8, no. 4, pp. 329-343, 2002.
  • [28] C. D. Vleeschouwer, J. F. Delaigle, and B. Macq: Circular interpretation of bijective transformations in lossless watermarking for media asset management, IEEE Transactions on Multimedia, vol. 5, no. 1, pp. 97-105, 2003.
  • [29] D. C. Wu and W. H. Tsai: A steganographic method for Images by pixel-value differencing, Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, 2003.
  • [30] B. Yang, Z. M. Lu, and S. H. Sun: Reversible watermarking in the VQ-compressed domain, Proceedings of the Fifth IASTED International Conference on Visualization, Imaging, and Image Processing (VIIP' 2005), Benidorm, Spain, pp. 298-303, 2005.
  • [31] Y. H. Yu, C. C. Chang, and Y. C. Hu: Hiding secret data in images via predictive coding, Pattern Recognition, vol. 38, no. 5, pp. 691-705, 2005.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0018-0038
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.