VQ applications in steganographic data hiding upon multimedia images

Wei Jen Wang, Cheng Ta Huang, Shiuh Jeng Wang

Research output: Contribution to journalArticlepeer-review

43 Scopus citations

Abstract

Data hiding is one of the most important techniques to achieve better data and communication protection by hiding information into a media carrier. It provides a secure method to distribute data through a public and open channel. Data hiding for vector quantization (VQ)-based images focuses on the problem of embedding secret data into a cover VQ-based image to achieve secret communication and data protection. This paper provides a state-of-the-art review and comparison of the different existing data-hiding methods for VQ-based images. In this paper, we classify VQ-based data-hiding methods into four nonoverlapping groups according to their reversibility and output formats, introduce the details of the representative methods, summarize the features of the representative methods, and compare the performance of the representative methods using peak signal-to-noise ratio, capacity of secret data, and bit rate. Our paper shows that an irreversible method is very likely a VQ-based data-hiding method that produces a stego-image as its output, and it can embed more secret data than a reversible method. Nonstandard encoding methods (e.g., joint neighboring coding) are becoming popular in reversible data hiding since they can increase the capacity for embedding the secret data. Some methods with high compression rate, such as the search-order coding-based methods, may reduce the compression rate in return for the capacity for the secret data.

Original languageEnglish
Article number6026895
Pages (from-to)528-537
Number of pages10
JournalIEEE Systems Journal
Volume5
Issue number4
DOIs
StatePublished - Dec 2011

Keywords

  • Date hiding
  • image processing
  • steganography
  • vector quantization (VQ)

Fingerprint

Dive into the research topics of 'VQ applications in steganographic data hiding upon multimedia images'. Together they form a unique fingerprint.

Cite this