Abstract
Information hiding refers to concealing data into cover media to prevent the private message from being stolen in peer-to-peer networks, mobile communication, and the cloud environment. Vector quantization (VQ) provides one means for this purpose; a distortion is created between the raw media and VQ compressed media. In this study, we proposed a flexible side-match vector quantization (SMVQ) information-hiding method. By using this method, the private message can be embedded into the distortion, and the visual quality of the stego media is improved. The proposed method achieves an improvement of about 13.13% (i.e., +3.73 dB) in the peak signal-to-noise ratio of the stego image and an improvement of about 59,355 bits of embedding capacity on average compared with Wang et al.’s method. The experiment results verify the significant contributions of this study to the field of SMVQ-based information hiding, especially with regard to the image quality of the stego image and the embedding capacity.
Similar content being viewed by others
References
Khan MA, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411
Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. Journal of Information Security and Applications 38:8–27
Singh S, Jeong YS, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222
Subramanian N, Jeyaraj A (Oct. 2018) Recent security challenges in cloud computing. Comput Electr Eng 71:28–42
Wang Y, Nakao A, Vasilakos AV, Ma J (2011) P2P soft security: on evolutionary dynamics of P2P incentive mechanism. Comput Commun 34(3):241–249
Li J, Wu J, Chen L (Oct. 2018) Block-secure: Blockchain based scheme for secure P2P cloud storage. Inf Sci 465:219–231
Gouri MS, Balan RVS (2017) Enhancement of multimedia security using random permutation with wavelet function. Comput Electr Eng 63:41–52
Rocha A, Li S, Kuo CCJ, Piva A, Huang J (2018) Data-driven multimedia forensics and security. J Vis Commun Image Represent 55:447–448
Tsai YY, Tsai DS, Liu CL (2013) Reversible data hiding scheme based on neighboring pixel differences. Digital Signal Processing 23(3):919–927
Hussain M, Wahab AWA, Ho ATS, Javed N, Jung KH (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57
Govind PVS, Sajila MK, Varghese BM (2016) A two stage data hiding scheme with high capacity based on interpolation and difference expansion. Procedia Technology 24:1311–1316
C VK, V N (2016) Hybrid local prediction error-based difference expansion reversible watermarking for medical images. Comput Electr Eng 53:333–345
Xuan G, Li X, Shi YQ (2018) Histogram-pair based reversible data hiding via searching for optimal four thresholds. Journal of Information Security and Applications 39:58–67
Li M, Li Y (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196
Hou D, Wang H, Zhang W, Yu N (2018) Reversible data hiding in JPEG image based on DCT frequency and block selection. Signal Process 148:41–47
Lin YK (2014) A data hiding scheme based upon DCT coefficient modification. Computer Standards & Interfaces 36(5):855–862
Qin C, Hu YC (2016) Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process 129:48–55
Chang CC, Nguyen TS, Lin MC, Lin CC (2016) A novel data-hiding and compression scheme based on block classification of SMVQ indices. Digital Signal Processing 51:142–155
Wang WJ, Huang CT, Tsuei SR, Wang SJ (2016) A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences. Multimed Tools Appl 75(22):14895–14916
Linde Y, Buzo A, Gray R (1980) An algorithm for vector Quantizer design. IEEE Trans Commun 28(1):84–95
Acknowledgements
This research was partially supported by Oriental Institute of Technology under the Grant RD106-7-11-102. The author would like to thank the Prof. CH YANG for providing some valuable comments and Mr. MC Tsai for offering the part of simulations.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection: Special Issue on IoT System Technologies based on Quality of Experience
Guest Editors: Cho Jaeik, Naveen Chilamkurti, and SJ Wang
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Huang, CT. A scheme of flexible and reversible information-hiding in SMVQ mechanism. Peer-to-Peer Netw. Appl. 13, 426–438 (2020). https://doi.org/10.1007/s12083-019-0720-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-019-0720-2