Reversible data hiding of a VQ index table based on referred counts

https://doi.org/10.1016/j.jvcir.2009.04.001Get rights and content

Abstract

This paper presents a new reversible VQ-based hiding scheme that can recover the original VQ compressed codes after data extraction. Our scheme sorts a VQ codebook using the referred counts. The VQ codebook is then divided into 2B clusters and half of these clusters are used to embed secret data, in which B denotes the size of the secret data embedded into each VQ index. Compared to Chang et al.’s scheme, which divides a sorted VQ codebook into 2B−1 × 3 clusters and uses the front one-third clusters to embed secret data, our method can embed more data. Moreover, indicator, index exchanging, and side-match prediction schemes are proposed to further improve our scheme. Under the same sorted VQ codebook, the experimental results demonstrate that our data hiding algorithm has higher capacities and better compression rates.

Introduction

As multimedia and the Internet have become popular, the problem of protecting transmitted media has become more important. Enhancing the safety of information transmissions using technologies based on data hiding [1], [2] has attracted great attention. Data hiding usually embeds secret data into media, such as images and videos, for the purpose of secret transmission or copyright protection. This paper uses images as the embedded media. Images before and after data hiding are called cover images and stego-images, respectively. Because data hiding could damage the original images, a good data hiding technology should have high capacity to embed a lot of data with imperceptive impact upon the quality of stego-images and undetectability to pass program detection [3], [4].

Typically, digital image data are transmitted in compressed format. Compression techniques such as JPEG, JPEG 2000, vector quantization (VQ), and block truncation coding have been proposed. Some hiding schemes based on VQ have been proposed [5], [6], [7]. Fig. 1 depicts an example of the VQ encoder in which the codebook size and vector dimensions are set to 256 and 16, respectively. When a 4 × 4 block (or vector) image is imported, the VQ encoder seeks the most similar codeword from the codebook to substitute for the input block. In this case, a codeword with index 2 is selected. The value 2 is exported as the compressed code for the input block.

In 1992, side-match VQ (SMVQ), which can improve vector quantization (VQ) compressing performance, was proposed by Kim [8]. In the SMVQ method, the blocks of an image in the first row and the first column are encoded using VQ. The residual blocks are predicted using the neighboring encoded blocks. Fig. 2 shows an example of SMVQ. Instead of using the original pixels to encode the X block, the SMVQ method uses the upper U block and the left L block to encode the X block. Let X0 = (U12 + L3)/2, X1 = U13, X2 = U14, X3 = U15, X4 = L7, X8 = L11, and X12 = L15. The seven assigned pixels are used to search the m closest codewords from the super codebook. The m closest codewords are then used to construct a state codebook. Finally, the codeword for the state codebook with the minimum Euclidean distance from X is used to encode X.

Some VQ-based hiding methods have the reversibility characteristic [9], [10], [11], [12], [13], [14], [15]. Reversible data hiding based on VQ generally refers to possessing the ability to extract hidden data and recover the images into the original VQ coding or the SMVQ coding.

We placed the developed reversible data hiding technologies based on VQ into three categories using the output characters as follows.

After data hiding, some approaches are limited to producing images as outputs [9], [11]. Literature [9] presented a reversible data-hiding scheme based on side-match vector quantization (SMVQ) for digitally compressed images. Another literature [11] presented a reversible information hiding scheme based on VQ.

After data hiding, a formal VQ coding or SMVQ coding is created as outputs [10], [12]. Generally speaking, approaches in this category require more skills. Of course, a formal VQ coding or SMVQ coding can be transformed into images. Literature [10] proposed a reversible embedding scheme for VQ-compressed images that is based on side matching and relocation. The method achieves reversibility without using the location map. To achieve the goal that the compressed cover image can be used repeatedly by different users, in [12] a reversible data-hiding scheme based on a modified side-match vector quantization (SMVQ) technique was proposed.

Approaches in this category add control messages into the formal VQ coding or SMVQ coding as outputs [13], [14], [15]. The volume of the embedded result is usually smaller than that of the original compressed image plus the hidden data. Therefore these methods can be applied to digital libraries. Literature [13] proposed a reversible scheme for VQ-compressed images that is based on a declustering strategy and takes advantage of the local spatial characteristics of the image. The main advantages of this method are ease of implementation, low computational demands and no requirement for auxiliary data. Further, literature [14] proposed an information hiding scheme based on side-match vector quantization (SMVQ), which conceals the secret information in the SMVQ compressed image indices. The methods in these two references can recover the embedded results into the original SMVQ coding. However, in literature [15], the embedded results can be recovered into the original VQ coding.

A hiding approach belonging to the third category is proposed in this paper. Our approaches can recover the original VQ coding, and also flexibility adjusts the embedding capacity. Compared to Chang et al.’s method [15], our approach has larger capacity. The remainder of this paper is as follows. Chang et al.’s method is introduced in Section 2. Section 3 describes the details of our proposed scheme. Section 4 shows some experimental results. Our conclusions are given in Section 5.

Section snippets

Past work by Chang et al

In 2007 Chang et al. provided a VQ-based embedding method that can losslessly recover the VQ index table [15]. The goal of their method is to enlarge the embedding capacity. Keeping the stego-image low in distortion is not considered in their method. Their reversible embedding algorithm could perform well in the digital library. In their method, a codebook is partitioned into some clusters. Some indexes in the codebook are reserved for acting as indicators. Data are embedded into the VQ index

Our proposed method

In this section, a new reversible hiding method based on VQ is proposed. Compared to Chang et al.’s method which uses the front one-third of codebook Ψ′ to embed secret data, our method uses the front half of codebook Ψ′ to embed secret data for the purpose of increasing the embedding capacity. In the following subsections our proposed method is introduced by showing its data embedding, data extracting, and reversing procedures. The strategies using indicators fully and exchanging indexes in

Simulation and experimental results

In this section, some experimental results are demonstrated to show the capacities and embedded compression rates of Chang et al.’s method and our proposed method. The experimental environment was configured on an Intel Pentium-IV machine with a 2.99 GHz CPU and a 512 MB main memory. In the experiments, two kinds of codebooks with sizes of 256 and 512 codewords were acquired by the LBG training algorithm [16], and each codeword was a 16-dimensional vector. As shown in Fig. 12(a)–(e), the five

Conclusions

This paper presented some new strategies for developing a reversible data hiding approach based on a VQ index table and referred counts. The first strategy involves the front half of a sorted codebook Ψ′ used to embed data to increase the embedding capacity. The second strategy using indicators fully can reduce the compression rate. The third strategy exchanges indexes in the sorted codebook to increase the embedding capacity further. Sometimes this strategy can also reduce the compression

Acknowledgments

This research was partially supported by the National Science Council of the Republic of China under the Grants NCS 97-2221-E-153-001 and the TWISC@NCKU, National Science Council under the Grants NSC 97-2219-E-006-003.

Cheng-Hsing Yang received the B.S. and M.S. degrees in Applied Mathematics from National Chung-Hsing University, Taiwan, in 1980 and 1992, respectively, and the Ph.D. degree in Electrical Engineering from National Taiwan University, Taiwan, in 1997. Currently, he is an Associate Professor in the Department of Computer Science, National Pingtung University of Education, Taiwan. His current research interests include information hiding and image watermarking.

References (16)

There are more references available in the full text version of this article.

Cited by (73)

  • An efficient general data hiding scheme based on image interpolation

    2020, Journal of Information Security and Applications
  • Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy

    2015, Journal of Visual Communication and Image Representation
    Citation Excerpt :

    The lowest embedding efficiency on average is 10.20% in Yang and Lin’s scheme [8]. Taking the image Lena for an example, the improved ratio of embedding efficiency is from 62.41% to 152.84% between our proposed scheme and the other six data hiding schemes [6,8,11,13–15]. The experimental results in Table␣8 demonstrate that our proposed method has a better performance in the embedding efficiency.

View all citing articles on Scopus

Cheng-Hsing Yang received the B.S. and M.S. degrees in Applied Mathematics from National Chung-Hsing University, Taiwan, in 1980 and 1992, respectively, and the Ph.D. degree in Electrical Engineering from National Taiwan University, Taiwan, in 1997. Currently, he is an Associate Professor in the Department of Computer Science, National Pingtung University of Education, Taiwan. His current research interests include information hiding and image watermarking.

Yi-Cheng Lin received the B.S. degree in Information Management from National Dong-Hwa University, Taiwan, in 2007. Currently, he is pursuing the M.S. degree in computer science from National Pingtung University of Education. His current research interests include data hiding, steganography, and image processing.

View full text