Reversible steganography based on side match and hit pattern for VQ-compressed images

Cheng Hsing Yang, Wei Jen Wang, Cheng Ta Huang, Shiuh Jeng Wang

Research output: Contribution to journalArticlepeer-review

36 Scopus citations

Abstract

Data hiding is an important technique in multimedia security. Multimedia data hiding techniques enable message senders to disguise secret data by embedding them into cover media. Thus, delivering secret messages is as easy as sending the cover media. Recently, many researchers have studied reversible data hiding for images. Those methods can reconstruct the original cover image and extract the embedded secret data from a stego-image. This study proposes a novel reversible steganographic method of embedding secret data into a vector quantization (VQ) compressed image by applying the concept of side match. The proposed method uses extra information, namely the hit pattern, to achieve reversibility. Moreover, its small hit pattern enables the embedding of the entire hit pattern along with the secret data in most cases. To optimize visual quality of the output stego-image, the method applies the concept of partitioned codebooks (state codebooks). The partition operation on the codebook uses a look-up table to minimize embedding and extraction time. We also propose the use of diagonal seed blocks to embed the entire hit pattern into the cover image without producing any extra control messages. Compared to the Chang and Lin method, the experimental results show that the proposed method has higher capacity, better visual quality, and shorter execution time.

Original languageEnglish
Pages (from-to)2218-2230
Number of pages13
JournalInformation Sciences
Volume181
Issue number11
DOIs
StatePublished - 1 Jun 2011

Keywords

  • Data hiding
  • Reversible data hiding
  • Side match vector quantization
  • Steganography
  • Vector quantization

Fingerprint

Dive into the research topics of 'Reversible steganography based on side match and hit pattern for VQ-compressed images'. Together they form a unique fingerprint.

Cite this