Skip to main content
Log in

A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganography conceals the secret data into cover media to avoid detection, such that no one suspects the existence of the embedded secret data. The existing VQ-based and SMVQ-based steganographic methods can only provide the same level of visual quality of what the VQ/SMVQ compression method can offer. In this study, we present the idea of using secret bits to repair SMVQ-compressed images. The idea can be viewed as the optimization problem of Using Secret Bits for Image-block Repairing based on Differences under SMVQ (USBIRDS). We propose a novel approach named Greedy-USBIRDS to find a near optimal solution for the USBIRDS problem. The experimental results show that, the proposed method provides excellent stego-image quality and large embedding capacity, in particular for complex cover images such as Baboon. While compared with Chen and Lin’s steganographic method, which is the known best method based on VQ/SMVQ, the proposed method achieves about 53 % more dB of PSNR of the stego-image quality and about 4.2 % more bits of the embedding capacity on average. All the experimental results indicate that, this study makes significant contributions to the area of VQ-based and SMVQ-based steganography, especially for its excellent stego-image quality and its ability to handle complex cover images very well.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Chan YK, Chen WT, Yu SS, Ho YA, Tsai CS, Chu YP (2009) A HDWT-based reversible data hiding method. J Syst Softw 82(3):411–421

    Article  Google Scholar 

  2. Chang CC, Lin CY (2006) Reversible steganography for VQ-compressed images using side matching and relocation. IEEE Trans Inf Forensics Secur 1(4):493–501

    Article  MathSciNet  Google Scholar 

  3. Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177(13):2768–2786

    Article  Google Scholar 

  4. Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circuits Syst Video Technol 16(10):1301–1308

    Article  Google Scholar 

  5. Chen WM, Lai CJ, Wang HC, Chao HC, Lo CH (2011) H.264 video watermarking with secret image sharing. IET Image Process 5(4):349–354

    Article  Google Scholar 

  6. Chen LS, Lin JC (2010) Steganography scheme based on side match vector quantization. Opt Eng 49(3):0370081–0370087

    Article  Google Scholar 

  7. Cogranne R, Retraint F (2013) An asymptotically uniformly most powerful test for LSB matching detection. IEEE Trans Inf Forensics Secur 8(3):464–476

    Article  Google Scholar 

  8. Guillermito (2004) Steganography: A few tools to discover hidden data. http://guillermito2.net/stegano/tools/index.html

  9. Keyvanpour MR, Merrikh-Bayat F (2011) Robust dynamic block-based image watermarking in DWT domain. Proc Comput Sci 3(1):238–242

    Article  MATH  Google Scholar 

  10. Kim T (1992) Side match and overlap match vector quantizers for images. IEEE Trans Image Process 1(2):170–185

    Article  Google Scholar 

  11. Lin CC, Tai WL, Chang CC (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582–3591

    Article  MATH  Google Scholar 

  12. Linde Y, Buzo A, Gray R (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28(1):84–95

    Article  Google Scholar 

  13. Lou DC, Hu CH (2012) LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Inf Sci 188(1):346–358

    Article  Google Scholar 

  14. Lu ZM, Wang JX, Liu BB (2009) An improved lossless data hiding scheme based on image VQ-index residual value coding. J Syst Softw 82(6):1016–1024

    Article  Google Scholar 

  15. Noda H, Niimi M, Kawaguchi E (2006) High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recogn Lett 27(5):455–461

    Article  Google Scholar 

  16. Peng F, Li X, Yang B (2012) Adaptive reversible data hiding scheme based on integer transform. Signal Process 92(1):54–62

    Article  Google Scholar 

  17. Phadikar A, Maity SP, Verma B (2011) Region based QIM digital watermarking scheme for image database in DCT domain. Comput Electr Eng 37(3):339–355

    Article  MATH  Google Scholar 

  18. Phan RCW (2008) Tampering with a watermarking-based image authentication scheme. Pattern Recogn 41(11):3493–3496

    Article  MathSciNet  MATH  Google Scholar 

  19. Run RS, Horng SJ, Lai JL, Kao TW, Chen RJ (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689

    Article  Google Scholar 

  20. Tsai P (2009) Histogram-based reversible data hiding for vector quantisation-compressed images. IET Image Process 3(2):100–114

    Article  MathSciNet  Google Scholar 

  21. Tsai YS, Tsai P (2011) Adaptive data hiding for vector quantization images based on overlapping codeword clustering. Inf Sci 181(15):3188–3198

    Article  Google Scholar 

  22. Wang WJ, Huang CT, Wang SJ (2011) VQ applications in steganographic data hiding upon multimedia images. IEEE Syst J 5(4):528–537

    Article  Google Scholar 

  23. Wang JX, Lu ZM (2009) A path optional lossless data hiding scheme based on VQ joint neighboring coding. Inf Sci 179(19):3332–3348

    Article  Google Scholar 

  24. Xu H, Wang J, Kim HJ (2010) Near-optimal solution to pair-wise LSB matching via an immune programming strategy. Inf Sci 180(8):1201–1217

    Article  Google Scholar 

  25. Yang CH, Lin YC (2010) Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding. J Vis Commun Image Represent 21(4):334–342

    Article  Google Scholar 

  26. Yang CH, Wang WJ, Huang CT, Wang SJ (2011) Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf Sci 181(11):2218–2230

    Article  Google Scholar 

  27. Yang CH, Weng CY, Wang SJ, Sun HM (2010) Varied PVD + LSB evading detection programs to spatial domain in data embedding systems. J Syst Softw 83(10):1635–1643

    Article  Google Scholar 

  28. Zhang T, Li W, Zhang Y, Zheng E, Ping X (2010) Steganalysis of LSB matching based on statistical modeling of pixel difference distributions. Inf Sci 180(23):4685–4694

    Article  Google Scholar 

Download references

Acknowledgments

This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grant NSC 102-2221-E-015-001-, MOST 103-2221-E-015-002- and MOST 103-2221-E-008-089-.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiuh-Jeng WANG.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, WJ., Huang, CT., Tsuei, SR. et al. A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences. Multimed Tools Appl 75, 14895–14916 (2016). https://doi.org/10.1007/s11042-015-2761-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2761-8

Keywords

Navigation