Skip to main content
Log in

A scheme of flexible and reversible information-hiding in SMVQ mechanism

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Information hiding refers to concealing data into cover media to prevent the private message from being stolen in peer-to-peer networks, mobile communication, and the cloud environment. Vector quantization (VQ) provides one means for this purpose; a distortion is created between the raw media and VQ compressed media. In this study, we proposed a flexible side-match vector quantization (SMVQ) information-hiding method. By using this method, the private message can be embedded into the distortion, and the visual quality of the stego media is improved. The proposed method achieves an improvement of about 13.13% (i.e., +3.73 dB) in the peak signal-to-noise ratio of the stego image and an improvement of about 59,355 bits of embedding capacity on average compared with Wang et al.’s method. The experiment results verify the significant contributions of this study to the field of SMVQ-based information hiding, especially with regard to the image quality of the stego image and the embedding capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Khan MA, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411

    Article  Google Scholar 

  2. Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. Journal of Information Security and Applications 38:8–27

    Article  Google Scholar 

  3. Singh S, Jeong YS, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222

    Article  Google Scholar 

  4. Subramanian N, Jeyaraj A (Oct. 2018) Recent security challenges in cloud computing. Comput Electr Eng 71:28–42

    Article  Google Scholar 

  5. Wang Y, Nakao A, Vasilakos AV, Ma J (2011) P2P soft security: on evolutionary dynamics of P2P incentive mechanism. Comput Commun 34(3):241–249

    Article  Google Scholar 

  6. Li J, Wu J, Chen L (Oct. 2018) Block-secure: Blockchain based scheme for secure P2P cloud storage. Inf Sci 465:219–231

    Article  Google Scholar 

  7. Gouri MS, Balan RVS (2017) Enhancement of multimedia security using random permutation with wavelet function. Comput Electr Eng 63:41–52

    Article  Google Scholar 

  8. Rocha A, Li S, Kuo CCJ, Piva A, Huang J (2018) Data-driven multimedia forensics and security. J Vis Commun Image Represent 55:447–448

    Article  Google Scholar 

  9. Tsai YY, Tsai DS, Liu CL (2013) Reversible data hiding scheme based on neighboring pixel differences. Digital Signal Processing 23(3):919–927

    Article  MathSciNet  Google Scholar 

  10. Hussain M, Wahab AWA, Ho ATS, Javed N, Jung KH (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57

    Article  Google Scholar 

  11. Govind PVS, Sajila MK, Varghese BM (2016) A two stage data hiding scheme with high capacity based on interpolation and difference expansion. Procedia Technology 24:1311–1316

    Article  Google Scholar 

  12. C VK, V N (2016) Hybrid local prediction error-based difference expansion reversible watermarking for medical images. Comput Electr Eng 53:333–345

    Article  Google Scholar 

  13. Xuan G, Li X, Shi YQ (2018) Histogram-pair based reversible data hiding via searching for optimal four thresholds. Journal of Information Security and Applications 39:58–67

    Article  Google Scholar 

  14. Li M, Li Y (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196

    Article  Google Scholar 

  15. Hou D, Wang H, Zhang W, Yu N (2018) Reversible data hiding in JPEG image based on DCT frequency and block selection. Signal Process 148:41–47

    Article  Google Scholar 

  16. Lin YK (2014) A data hiding scheme based upon DCT coefficient modification. Computer Standards & Interfaces 36(5):855–862

    Article  Google Scholar 

  17. Qin C, Hu YC (2016) Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process 129:48–55

    Article  Google Scholar 

  18. Chang CC, Nguyen TS, Lin MC, Lin CC (2016) A novel data-hiding and compression scheme based on block classification of SMVQ indices. Digital Signal Processing 51:142–155

    Article  MathSciNet  Google Scholar 

  19. Wang WJ, Huang CT, Tsuei SR, Wang SJ (2016) A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences. Multimed Tools Appl 75(22):14895–14916

    Article  Google Scholar 

  20. Linde Y, Buzo A, Gray R (1980) An algorithm for vector Quantizer design. IEEE Trans Commun 28(1):84–95

    Article  Google Scholar 

Download references

Acknowledgements

This research was partially supported by Oriental Institute of Technology under the Grant RD106-7-11-102. The author would like to thank the Prof. CH YANG for providing some valuable comments and Mr. MC Tsai for offering the part of simulations.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng-Ta Huang.

Additional information

This article is part of the Topical Collection: Special Issue on IoT System Technologies based on Quality of Experience

Guest Editors: Cho Jaeik, Naveen Chilamkurti, and SJ Wang

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, CT. A scheme of flexible and reversible information-hiding in SMVQ mechanism. Peer-to-Peer Netw. Appl. 13, 426–438 (2020). https://doi.org/10.1007/s12083-019-0720-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-0720-2

Keywords

Navigation