Abstract
In this paper, we shall propose a more secure scheme with a larger embedding capacity for image steganography based on vector quantization and discrete cosine transform. Instead of encrypting the whole secret image, our method only encrypts the important features extracted from a secret image and then embeds the encrypted features into a cover image for producing a stego-image. During the work of data encryption and embedment, we introduce the data encryption standard cryptosystem and a pseudo random mechanism to ensure the security of the secret image. Besides, the distortion between the cover image and the stego-image is also imperceptible by the human eye, even when the size of the secret image is as large as that of the cover image. According to the substantial experimental results we shall give later, we can demonstrate the applicability of our method.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
R. Anderson, and F. Petitcolas, “On the limits of steganography,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, 1998, pp. 471–478.
Bourbakis, and C. Alexopoulos, “Picture data encryption using scan patterns,” Pattern Recognit., Vol. 25, 1992, pp. 567–581.
Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM System Journal, Vol. 35, 1996, pp. 313–336.
K. Chang, and J. L. Liou, “An image encryption scheme based on quadtree compression scheme,” Proc. Int. Computer Symp., Vol. 1, 1994, pp. 230–237.
Cziho, B. Solaiman, I. Lovanyi, G. Cazuguel, and C. Roux, “An optimization of finite-state vector quantization for image compression,” Signal Processing: Image Communication, Vol. 15, 2000, pp. 545–558.
T. S. Chen, C. C. Chang, and M. S. Hwang, “A virtual image cryptosystem based upon vector quantization,” IEEE Transactions on Image Processing, Vol. 7, No. 10, October 1998, pp. 1485–1488.
J. J. Chae, and B. S. Manjunath, “A robust embedded data from wavelet coefficients,” Proc. SPIE-Int. Soc. Opt. Eng., Vol. 3312, 1998, pp. 308–317.
D. E. R. Denning, Cryptography and Data Security, Reading, MA: Addison-Wesley, 1983.
A. Gersho, and R. M. Gray, Vector Quantization and Signal Compression, Kluwer Academic Publishers, Boston, 1992.
C. J. Kuo, “Novel image encryption technique and its application in progressive transmission,” J. Electron. Imag., Vol. 2, 1993, pp. 345–351.
L. M. Marvel, C. G. Boncelet, Jr., and C. T. Retter, “Spread spectrum image steganography,” IEEE Transactions on Image Processing, Vol. 8, No. 8, August 1999, pp. 1075–1083.
K. R. Rao, and P. Y ip, Discrete Cosine Transform-Algorithms, Advantages, Applications, Academic Press, 1990.
C. Schwartz, “A new graphical method for encryption of computer data,” Cryptologia, Vol. 15, 1991, pp. 43–46.
D. C. Wu, and W. H. Tsai, “Spatial-domain image hiding using image differencing,” IEE Proc.-Vis. Image Signal Process., Vol. 147, No. 1, February 2000, pp. 29–37.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, CC., Yeh, JC., Hsiao, JY. (2001). A Novel Scheme for Securing Image Steganography. In: Shum, HY., Liao, M., Chang, SF. (eds) Advances in Multimedia Information Processing — PCM 2001. PCM 2001. Lecture Notes in Computer Science, vol 2195. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45453-5_103
Download citation
DOI: https://doi.org/10.1007/3-540-45453-5_103
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42680-6
Online ISBN: 978-3-540-45453-3
eBook Packages: Springer Book Archive