Abstract
With the continued expansion of the Internet and increased means of communication, it is inevitable that we send data via the Internet or other such media. The important issue of maintaining the confidentiality and integrity of such data when using the Internet as a primary mode of communication also continues to grow in scale. In this paper, we therefore propose an information-hiding method based on the vector quantization (VQ) compression algorithm with elastic indicators; further, we present our design for a key stream to enhance security. Our experimental results have shown that our proposed method performs better as compared to the method introduced by Lee et al. in 2013.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Dadgostar, H., Afsari, F.: Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB. J. Inf. Secur. Appl. 30, 94–104 (2016)
Lerch-Hostalot, D., Megías, D.: LSB matching steganalysis based on patterns of pixel differences and random embedding. Comput. Secur. 32, 192–206 (2013)
Govind, P.V.S., Sajila, M.K., Varghese, B.M.: A two stage data hiding scheme with high capacity based on interpolation and difference expansion. Procedia Technol. 24, 1311–1316 (2016)
Shiu, C.W., Chen, Y.C., Hong, W.: Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process. Image Commun. 39, 226–233 (2015)
Ou, B., Li, X., Zhao, Y., Ni, R., Shi, Y.Q.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22, 5010–5021 (2013)
Li, X., Zhang, W., Gui, X., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10, 2016–2027 (2015)
Rad, R.M., Wong, K., Guo, J.M.: Reversible data hiding by adaptive group modification on histogram of prediction errors. Signal Process. 125, 315–328 (2016)
Lin, Y.K.: A data hiding scheme based upon DCT coefficient modification. Comput. Stand. Interfaces 36, 855–862 (2014)
Chang, P.C., Chung, K.L., Chen, J.J., Lin, C.H., Lin, T.J.: A DCT/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames. J. Vis. Commun. Image Represent. 25, 239–253 (2014)
Mao, J.F., Niu, X.X., Xiao, G., Sheng, W.G., Zhang, N.N.: A steganalysis method in the DCT domain. Multimed. Tools Appl. 75, 5999–6019 (2016)
Phadikar, A., Maity, S.P., Mandal, M.: Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images. J. Vis. Commun. Image Represent. 23, 454–466 (2012)
Lee, J.D., Chiou, Y.H., Guo, J.M.: Lossless data hiding for VQ indices based on neighboring correlation. Inf. Sci. 221, 419–438 (2013)
Qin, C., Hu, Y.C.: Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process. 129, 48–55 (2016)
Lin, C.C., Liu, X.L., Yuan, S.M.: Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping. Inf. Sci. 293, 314–326 (2015)
Linde, Y., Buzo, A., Gray, R.M.: An algorithm for vector quantizer design. IEEE Trans. Commun. 28, 84–95 (1980)
Huffman, D.A.: A method for the construction of minimum-redundancy codes. Proc. IRE 40, 1098–1101 (1952)
Acknowledgments
This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grant MOST 104-2221-E-015-001-, MOST 105-2221-E-015-002-, and the Oriental Institute of Technology under the Grant RD1050025 and 151001-708.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Huang, CT., Sun, DE., Chen, YL., Wang, SJ. (2017). VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance. In: Wang, G., Chau, M., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2017. Lecture Notes in Computer Science(), vol 10241. Springer, Cham. https://doi.org/10.1007/978-3-319-57463-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-57463-9_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57462-2
Online ISBN: 978-3-319-57463-9
eBook Packages: Computer ScienceComputer Science (R0)