Skip to main content
Log in

A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the growth of the Internet and the advancements in modern communication systems, sending data over the Internet or other media is now a commonplace practice. Consequently, it has become an important issue to secure the confidentiality and integrity of data because the data are sent via the Internet as a primary method of communication. This paper proposes a steganographic method based on the vector quantization coding compression algorithm with elastic indicators, which also incorporates a keystream to enhance security. Our experimental results have shown that the proposed method performs more effectively compared to the method proposed by Lee et al. in 2013.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156

    Article  MathSciNet  Google Scholar 

  2. Al-Qershi OM, Khoo BE (2011) High capacity data hiding schemes for medical mages based on difference expansion. J Syst Softw 84(1):105–112

    Article  Google Scholar 

  3. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(1):469–474

    Article  Google Scholar 

  4. Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circ Syst Video Technol 16(10):1301–1308

    Article  Google Scholar 

  5. Chen SK (2011) A module-based LSB substitution method with lossless secret data compression. Comput Stand Interfaces 33(4):367–371

    Article  Google Scholar 

  6. Hu YC (2006) High-capacity image hiding scheme based on vector quantization. Pattern Recogn 39(9):1715–1724

    Article  Google Scholar 

  7. Huang HY, Chang SH (2010) A lossless data hiding based on discrete Haar wavelet transform. IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 1554–1559

  8. Huang CT, Wang WJ, Yang CH, Wang SJ (2013) A scheme of reversible information hiding based on SMVQ. Imaging Sci J 61(2):195–203

    Article  Google Scholar 

  9. Huffman D (1952) A method for the construction of minimum-redundancy codes. Proc IRE 40(9):1098–1101

    Article  Google Scholar 

  10. Lee JD, Chiou YH, Guo JM (2013) Lossless data hiding for VQ indices based on neighboring correlation. Inf Sci 221(1):419–438

    Article  Google Scholar 

  11. Lin YK (2012) High capacity reversible data hiding scheme based upon discrete cosine transformation. J Syst Softw 85(10):2395–2404

    Article  Google Scholar 

  12. Linde Y, Bruzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28(1):84–95

    Article  Google Scholar 

  13. Pawar PH, Jondhale KC (2012) Histogram- based reversible data hiding using block division. IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACC CT), pp 295–299

  14. Sencar HT, Ramkumar M, Akansu AN (2006) An overview of scalar quantization based data hiding methods. Signal Process 86(5):893–914

    Article  Google Scholar 

  15. Singh S, Siddiqui TJ, Singh R, Singh HV (2011) DCT-domain robust data hiding using chaotic sequence. 2011 International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), pp 300–303

Download references

Acknowledgments

This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grant MOST 106-2221-E-015-001-, and Oriental Institute of Technology under the Grant 106-7-11-102.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiuh-Jeng Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, CT., Lin, LC., Sun, DE. et al. A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks. Multimed Tools Appl 78, 3131–3151 (2019). https://doi.org/10.1007/s11042-018-5811-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5811-1

Keywords

Navigation