A low bit-rate SOC-based reversible data hiding algorithm by using new encoding strategies

  • Zhibin PanEmail author
  • Erdun Gao
  • Ruoxin Zhu
  • Lingfei Wang


Search order coding (SOC) benefits a lot from the correlation of neighboring blocks for vector quantization (VQ)-compressed images. SOC selects a number of different indices in its search path as candidate search order codes. In this work, we present a low bit-rate SOC-based reversible data hiding algorithm benefiting from novel encoding strategies which exploit the information of the placeholders. The blocks are classified into two categories by the placeholders, where different encoding strategies are designed, respectively. Firstly, for the block in smooth region, the placeholders in its neighborhood are employed to compress the VQ index. Secondly, for the block in complex region, SOC is employed to compress the VQ index. Finally, for the blocks that cannot be processed by its placeholders and SOC, an effective prediction method named accurate gradient selective prediction (AGSP) and Huffman coding are introduced. After encoding phase, the size of the output bit stream is reduced so that space is saved for data embedding. Experiment results show that our proposed method outperforms other state-of-the-art SOC-based algorithms in bit rate and embedding capacity.


Reversible data hiding Image compression Search order coding (SOC) Vector quantization (VQ) Placeholder (PH) of repetition search point 



This work is supported in part by the Open Project Program of the National Laboratory of Pattern Recognition (NLPR) (Grant No. 201800030).


  1. 1.
    Celik MU, Sharma G, Tekalp AM, Sable E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266CrossRefGoogle Scholar
  2. 2.
    Chang CC, Chen GM, Lin MH (2004) Information hiding based on search-order coding for VQ indices. Pattern Recogn Lett 25(11):1253–1261CrossRefGoogle Scholar
  3. 3.
    Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177:2768–2786CrossRefGoogle Scholar
  4. 4.
    Chang CC, Lu TC, Horng G, Huang YH (2016) Very efficient variable-length codes for the lossless compression of VQ indices. Multimed Tools Appl 75(6):3537–3552CrossRefGoogle Scholar
  5. 5.
    Chang CC, Nguyen TS, Lin CC (2015) A reversible compression code hiding using SOC and SMVQ indices. Inf Sci 300:85–99CrossRefGoogle Scholar
  6. 6.
    Chang CC, Wu WC (2009) A lossless data embedding technique by joint neighboring coding. Pattern Recogn 42(7):1597–1603CrossRefGoogle Scholar
  7. 7.
    Diffie W, Hellman ME (1977) Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10(6):74–84CrossRefGoogle Scholar
  8. 8.
    Fridrich J, Goljan M, Du R (2001) Invertible authentication watermark for JPEG images. Proc. ITCC, Las VegasCrossRefGoogle Scholar
  9. 9.
    Gersho A, Gray RM (1992) Vector Quantization and Signal Compression. Kluwer, NorwellCrossRefGoogle Scholar
  10. 10.
    Gray RM (1984) Vector quantization. IEEE Acoust Speech Signal Process 1:4–29Google Scholar
  11. 11.
    Hsieh CH, Tsai JC (1996) Lossless compression of VQ index with search-order coding. IEEE Trans Image Process 5(11):1579–1582CrossRefGoogle Scholar
  12. 12.
    Huffman DA (1952) A method for the construction of minimum redundancy codes. Proc IRE 40(9):1098–1101CrossRefGoogle Scholar
  13. 13.
    Kamstra L, Heijmans HJAM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090MathSciNetCrossRefGoogle Scholar
  14. 14.
    Kim T (1992) Side match and overlap match vector quantizers for images. IEEE Trans Image Process 1(4):170–185MathSciNetCrossRefGoogle Scholar
  15. 15.
    Lee J, Chiou Y, Guo J (2013) Lossless data hiding for VQ indices based on neighboring correlation. Inf Sci:419–438Google Scholar
  16. 16.
    Lee JD, Chiou YH, Guo JM (2013) Lossless data hiding for VQ indices based on neighboring correlation. Inf Sci 221:419–438CrossRefGoogle Scholar
  17. 17.
    Li X, Zhang W, Gui X (2017) Efficient Reversible Data Hiding Based on Multiple Histograms Modification. IEEE Transactions on Information Forensics & Security 10(9):2016–2027Google Scholar
  18. 18.
    Lin YK (2012) High capacity reversible data hiding scheme based upon discrete cosine transformation. J Syst Softw 85(10):2395–2404CrossRefGoogle Scholar
  19. 19.
    Lin CC, Liu XL, Yuan SM (2015) Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping. Inf Sci 293:314–326CrossRefGoogle Scholar
  20. 20.
    Lin YC, Wang CC (1999) Digital images watermarking by vector quantization. Proc Natl Comput Symp:76–87Google Scholar
  21. 21.
    Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28(1):84–95CrossRefGoogle Scholar
  22. 22.
    Liu Y, Nie L, Han L, et al (2016) Action2Activity: recognizing complex activities from sensor data. 1617–1623Google Scholar
  23. 23.
    Liu Y, Nie L, Liu L et al (2016) From action to activity: Sensor-based activity recognition. Neurocomputing 181:108–115CrossRefGoogle Scholar
  24. 24.
    Pan ZB, Hu S, Ma XX (2015) A new lossless data hiding method based on joint neighboring coding method. JVis Commun Image Represent:14–23Google Scholar
  25. 25.
    Pan ZB, Ma XX, Deng XM, Hu S (2013) Low bit-rate information hiding method based on search-order-coding technique. J Syst Softw 86:2863–2869CrossRefGoogle Scholar
  26. 26.
    Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978MathSciNetCrossRefGoogle Scholar
  27. 27.
    Qin C, Hu Y (2016) Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process:48–55Google Scholar
  28. 28.
    Qin C, Ji P, Wang J, Chang CC (2017) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267–2287CrossRefGoogle Scholar
  29. 29.
    Ramroach S (2015) A reversible steganographic scheme for VQ indices based on joint neighboring coding. Expert Syst Appl 42(2):713–722CrossRefGoogle Scholar
  30. 30.
    Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetCrossRefGoogle Scholar
  31. 31.
    Tang H, Kamata S (2006) A gradient based predictive coding for lossless image compression. IEICE Trans Inf Syst E89-D(7):2250–2256CrossRefGoogle Scholar
  32. 32.
    Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896CrossRefGoogle Scholar
  33. 33.
    Wang WJ, Huang CT, Liu CM, Su PC, Wang SJ (2013) Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping. Inf Sci 246:69–82MathSciNetCrossRefGoogle Scholar
  34. 34.
    Wang JX, Lu ZM (2009) A path optional lossless data hiding scheme based on VQ joint neighboring coding. Inf Sci 179(19):3332–3348CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Zhibin Pan
    • 1
    Email author
  • Erdun Gao
    • 1
  • Ruoxin Zhu
    • 1
  • Lingfei Wang
    • 1
  1. 1.School of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’anPeople’s Republic of China

Personalised recommendations