Abstract
Steganography conceals the secret data into cover media to avoid detection, such that no one suspects the existence of the embedded secret data. The existing VQ-based and SMVQ-based steganographic methods can only provide the same level of visual quality of what the VQ/SMVQ compression method can offer. In this study, we present the idea of using secret bits to repair SMVQ-compressed images. The idea can be viewed as the optimization problem of Using Secret Bits for Image-block Repairing based on Differences under SMVQ (USBIRDS). We propose a novel approach named Greedy-USBIRDS to find a near optimal solution for the USBIRDS problem. The experimental results show that, the proposed method provides excellent stego-image quality and large embedding capacity, in particular for complex cover images such as Baboon. While compared with Chen and Lin’s steganographic method, which is the known best method based on VQ/SMVQ, the proposed method achieves about 53 % more dB of PSNR of the stego-image quality and about 4.2 % more bits of the embedding capacity on average. All the experimental results indicate that, this study makes significant contributions to the area of VQ-based and SMVQ-based steganography, especially for its excellent stego-image quality and its ability to handle complex cover images very well.
Similar content being viewed by others
References
Chan YK, Chen WT, Yu SS, Ho YA, Tsai CS, Chu YP (2009) A HDWT-based reversible data hiding method. J Syst Softw 82(3):411–421
Chang CC, Lin CY (2006) Reversible steganography for VQ-compressed images using side matching and relocation. IEEE Trans Inf Forensics Secur 1(4):493–501
Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177(13):2768–2786
Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circuits Syst Video Technol 16(10):1301–1308
Chen WM, Lai CJ, Wang HC, Chao HC, Lo CH (2011) H.264 video watermarking with secret image sharing. IET Image Process 5(4):349–354
Chen LS, Lin JC (2010) Steganography scheme based on side match vector quantization. Opt Eng 49(3):0370081–0370087
Cogranne R, Retraint F (2013) An asymptotically uniformly most powerful test for LSB matching detection. IEEE Trans Inf Forensics Secur 8(3):464–476
Guillermito (2004) Steganography: A few tools to discover hidden data. http://guillermito2.net/stegano/tools/index.html
Keyvanpour MR, Merrikh-Bayat F (2011) Robust dynamic block-based image watermarking in DWT domain. Proc Comput Sci 3(1):238–242
Kim T (1992) Side match and overlap match vector quantizers for images. IEEE Trans Image Process 1(2):170–185
Lin CC, Tai WL, Chang CC (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582–3591
Linde Y, Buzo A, Gray R (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28(1):84–95
Lou DC, Hu CH (2012) LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Inf Sci 188(1):346–358
Lu ZM, Wang JX, Liu BB (2009) An improved lossless data hiding scheme based on image VQ-index residual value coding. J Syst Softw 82(6):1016–1024
Noda H, Niimi M, Kawaguchi E (2006) High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recogn Lett 27(5):455–461
Peng F, Li X, Yang B (2012) Adaptive reversible data hiding scheme based on integer transform. Signal Process 92(1):54–62
Phadikar A, Maity SP, Verma B (2011) Region based QIM digital watermarking scheme for image database in DCT domain. Comput Electr Eng 37(3):339–355
Phan RCW (2008) Tampering with a watermarking-based image authentication scheme. Pattern Recogn 41(11):3493–3496
Run RS, Horng SJ, Lai JL, Kao TW, Chen RJ (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689
Tsai P (2009) Histogram-based reversible data hiding for vector quantisation-compressed images. IET Image Process 3(2):100–114
Tsai YS, Tsai P (2011) Adaptive data hiding for vector quantization images based on overlapping codeword clustering. Inf Sci 181(15):3188–3198
Wang WJ, Huang CT, Wang SJ (2011) VQ applications in steganographic data hiding upon multimedia images. IEEE Syst J 5(4):528–537
Wang JX, Lu ZM (2009) A path optional lossless data hiding scheme based on VQ joint neighboring coding. Inf Sci 179(19):3332–3348
Xu H, Wang J, Kim HJ (2010) Near-optimal solution to pair-wise LSB matching via an immune programming strategy. Inf Sci 180(8):1201–1217
Yang CH, Lin YC (2010) Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding. J Vis Commun Image Represent 21(4):334–342
Yang CH, Wang WJ, Huang CT, Wang SJ (2011) Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf Sci 181(11):2218–2230
Yang CH, Weng CY, Wang SJ, Sun HM (2010) Varied PVD + LSB evading detection programs to spatial domain in data embedding systems. J Syst Softw 83(10):1635–1643
Zhang T, Li W, Zhang Y, Zheng E, Ping X (2010) Steganalysis of LSB matching based on statistical modeling of pixel difference distributions. Inf Sci 180(23):4685–4694
Acknowledgments
This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grant NSC 102-2221-E-015-001-, MOST 103-2221-E-015-002- and MOST 103-2221-E-008-089-.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, WJ., Huang, CT., Tsuei, SR. et al. A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences. Multimed Tools Appl 75, 14895–14916 (2016). https://doi.org/10.1007/s11042-015-2761-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2761-8