Abstract
Hiding secret message in an image has received significant attention that it will not arise attackers’ suspicion. Recently, VQ-based compression domain is frequently employed. Although some hiding schemes are VQ-based compression domain, their hiding capacities are limited. To increase the hiding capacity, this paper applies codewords grouping concept to design an adaptive capacity hiding scheme. Based on our scheme, more bits can be embedded into single VQ index only if its degradation caused by replacing other codeword is less than the predefined threshold. The advantages of this proposed scheme are the higher capacity exploration on secret embedding, and acceptable stability on the display of stego-images.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chang, C.C., Hsiao, J.Y., Chan, C.S.: Finding Optimal Least-significant-bit Substitution in Image Hiding by Dynamic Programming Strategy. Pattern Recognition 36, 1583–1595 (2003)
Chang, C.C., Tsai, P.Y., Lin, M.H.: An Adaptive Steganography for Index-based Images Using Codeword Grouping. In: Pacific Rim Conference on Multimedia, Tokyo, Japan, pp. 731–738 (2004)
Cox, I.J., Killian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)
Jo, M., Kim, H.D.: A digital Image Watermarking Scheme Based on Vector Quantisation. IEICE Transactions on Information and Systems E85-D(6) (June 2002)
Noda, H., Spaulding, J., Shirazi, M.N., Kawaguchi, E.: Application of Bit-plane Decomposition Steganography to JPEG2000 Encoded Images. IEEE Signal Processing Letters 9(12), 410–413 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, C., Lin, C., Yeh, J. (2005). Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_84
Download citation
DOI: https://doi.org/10.1007/11596981_84
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)