Skip to main content

A Novel Scheme for Securing Image Steganography

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2195))

Abstract

In this paper, we shall propose a more secure scheme with a larger embedding capacity for image steganography based on vector quantization and discrete cosine transform. Instead of encrypting the whole secret image, our method only encrypts the important features extracted from a secret image and then embeds the encrypted features into a cover image for producing a stego-image. During the work of data encryption and embedment, we introduce the data encryption standard cryptosystem and a pseudo random mechanism to ensure the security of the secret image. Besides, the distortion between the cover image and the stego-image is also imperceptible by the human eye, even when the size of the secret image is as large as that of the cover image. According to the substantial experimental results we shall give later, we can demonstrate the applicability of our method.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson, and F. Petitcolas, “On the limits of steganography,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, 1998, pp. 471–478.

    Article  Google Scholar 

  2. Bourbakis, and C. Alexopoulos, “Picture data encryption using scan patterns,” Pattern Recognit., Vol. 25, 1992, pp. 567–581.

    Article  Google Scholar 

  3. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM System Journal, Vol. 35, 1996, pp. 313–336.

    Article  Google Scholar 

  4. K. Chang, and J. L. Liou, “An image encryption scheme based on quadtree compression scheme,” Proc. Int. Computer Symp., Vol. 1, 1994, pp. 230–237.

    Google Scholar 

  5. Cziho, B. Solaiman, I. Lovanyi, G. Cazuguel, and C. Roux, “An optimization of finite-state vector quantization for image compression,” Signal Processing: Image Communication, Vol. 15, 2000, pp. 545–558.

    Article  Google Scholar 

  6. T. S. Chen, C. C. Chang, and M. S. Hwang, “A virtual image cryptosystem based upon vector quantization,” IEEE Transactions on Image Processing, Vol. 7, No. 10, October 1998, pp. 1485–1488.

    Article  MATH  MathSciNet  Google Scholar 

  7. J. J. Chae, and B. S. Manjunath, “A robust embedded data from wavelet coefficients,” Proc. SPIE-Int. Soc. Opt. Eng., Vol. 3312, 1998, pp. 308–317.

    Google Scholar 

  8. D. E. R. Denning, Cryptography and Data Security, Reading, MA: Addison-Wesley, 1983.

    Google Scholar 

  9. A. Gersho, and R. M. Gray, Vector Quantization and Signal Compression, Kluwer Academic Publishers, Boston, 1992.

    MATH  Google Scholar 

  10. C. J. Kuo, “Novel image encryption technique and its application in progressive transmission,” J. Electron. Imag., Vol. 2, 1993, pp. 345–351.

    Article  Google Scholar 

  11. L. M. Marvel, C. G. Boncelet, Jr., and C. T. Retter, “Spread spectrum image steganography,” IEEE Transactions on Image Processing, Vol. 8, No. 8, August 1999, pp. 1075–1083.

    Article  Google Scholar 

  12. K. R. Rao, and P. Y ip, Discrete Cosine Transform-Algorithms, Advantages, Applications, Academic Press, 1990.

    Google Scholar 

  13. C. Schwartz, “A new graphical method for encryption of computer data,” Cryptologia, Vol. 15, 1991, pp. 43–46.

    Article  Google Scholar 

  14. D. C. Wu, and W. H. Tsai, “Spatial-domain image hiding using image differencing,” IEE Proc.-Vis. Image Signal Process., Vol. 147, No. 1, February 2000, pp. 29–37.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chang, CC., Yeh, JC., Hsiao, JY. (2001). A Novel Scheme for Securing Image Steganography. In: Shum, HY., Liao, M., Chang, SF. (eds) Advances in Multimedia Information Processing — PCM 2001. PCM 2001. Lecture Notes in Computer Science, vol 2195. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45453-5_103

Download citation

  • DOI: https://doi.org/10.1007/3-540-45453-5_103

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42680-6

  • Online ISBN: 978-3-540-45453-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics