Information hiding refers to concealing data into cover media to prevent the private message from being stolen in peer-to-peer networks, mobile communication, and the cloud environment. Vector quantization (VQ) provides one means for this purpose; a distortion is created between the raw media and VQ compressed media. In this study, we proposed a flexible side-match vector quantization (SMVQ) information-hiding method. By using this method, the private message can be embedded into the distortion, and the visual quality of the stego media is improved. The proposed method achieves an improvement of about 13.13% (i.e., +3.73 dB) in the peak signal-to-noise ratio of the stego image and an improvement of about 59,355 bits of embedding capacity on average compared with Wang et al.’s method. The experiment results verify the significant contributions of this study to the field of SMVQ-based information hiding, especially with regard to the image quality of the stego image and the embedding capacity.
Side match vector quantization (SMVQ) Image distortion Information hiding Flexible embedding
This is a preview of subscription content, log in to check access.
This research was partially supported by Oriental Institute of Technology under the Grant RD106-7-11-102. The author would like to thank the Prof. CH YANG for providing some valuable comments and Mr. MC Tsai for offering the part of simulations.
Khan MA, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411CrossRefGoogle Scholar
Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. Journal of Information Security and Applications 38:8–27CrossRefGoogle Scholar
Singh S, Jeong YS, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222CrossRefGoogle Scholar
Subramanian N, Jeyaraj A (Oct. 2018) Recent security challenges in cloud computing. Comput Electr Eng 71:28–42CrossRefGoogle Scholar
Wang Y, Nakao A, Vasilakos AV, Ma J (2011) P2P soft security: on evolutionary dynamics of P2P incentive mechanism. Comput Commun 34(3):241–249CrossRefGoogle Scholar
Li J, Wu J, Chen L (Oct. 2018) Block-secure: Blockchain based scheme for secure P2P cloud storage. Inf Sci 465:219–231CrossRefGoogle Scholar
Gouri MS, Balan RVS (2017) Enhancement of multimedia security using random permutation with wavelet function. Comput Electr Eng 63:41–52CrossRefGoogle Scholar
Rocha A, Li S, Kuo CCJ, Piva A, Huang J (2018) Data-driven multimedia forensics and security. J Vis Commun Image Represent 55:447–448CrossRefGoogle Scholar
Tsai YY, Tsai DS, Liu CL (2013) Reversible data hiding scheme based on neighboring pixel differences. Digital Signal Processing 23(3):919–927MathSciNetCrossRefGoogle Scholar
Hussain M, Wahab AWA, Ho ATS, Javed N, Jung KH (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57CrossRefGoogle Scholar
Govind PVS, Sajila MK, Varghese BM (2016) A two stage data hiding scheme with high capacity based on interpolation and difference expansion. Procedia Technology 24:1311–1316CrossRefGoogle Scholar
C VK, V N (2016) Hybrid local prediction error-based difference expansion reversible watermarking for medical images. Comput Electr Eng 53:333–345CrossRefGoogle Scholar
Xuan G, Li X, Shi YQ (2018) Histogram-pair based reversible data hiding via searching for optimal four thresholds. Journal of Information Security and Applications 39:58–67CrossRefGoogle Scholar
Li M, Li Y (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196CrossRefGoogle Scholar
Hou D, Wang H, Zhang W, Yu N (2018) Reversible data hiding in JPEG image based on DCT frequency and block selection. Signal Process 148:41–47CrossRefGoogle Scholar
Lin YK (2014) A data hiding scheme based upon DCT coefficient modification. Computer Standards & Interfaces 36(5):855–862CrossRefGoogle Scholar
Qin C, Hu YC (2016) Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process 129:48–55CrossRefGoogle Scholar
Chang CC, Nguyen TS, Lin MC, Lin CC (2016) A novel data-hiding and compression scheme based on block classification of SMVQ indices. Digital Signal Processing 51:142–155MathSciNetCrossRefGoogle Scholar
Wang WJ, Huang CT, Tsuei SR, Wang SJ (2016) A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences. Multimed Tools Appl 75(22):14895–14916CrossRefGoogle Scholar
Linde Y, Buzo A, Gray R (1980) An algorithm for vector Quantizer design. IEEE Trans Commun 28(1):84–95CrossRefGoogle Scholar