Advertisement

A scheme of flexible and reversible information-hiding in SMVQ mechanism

  • Cheng-Ta HuangEmail author
Article
  • 6 Downloads
Part of the following topical collections:
  1. Special Issue on IoT System Technologies based on Quality of Experience

Abstract

Information hiding refers to concealing data into cover media to prevent the private message from being stolen in peer-to-peer networks, mobile communication, and the cloud environment. Vector quantization (VQ) provides one means for this purpose; a distortion is created between the raw media and VQ compressed media. In this study, we proposed a flexible side-match vector quantization (SMVQ) information-hiding method. By using this method, the private message can be embedded into the distortion, and the visual quality of the stego media is improved. The proposed method achieves an improvement of about 13.13% (i.e., +3.73 dB) in the peak signal-to-noise ratio of the stego image and an improvement of about 59,355 bits of embedding capacity on average compared with Wang et al.’s method. The experiment results verify the significant contributions of this study to the field of SMVQ-based information hiding, especially with regard to the image quality of the stego image and the embedding capacity.

Keywords

Side match vector quantization (SMVQ) Image distortion Information hiding Flexible embedding 

Notes

Acknowledgements

This research was partially supported by Oriental Institute of Technology under the Grant RD106-7-11-102. The author would like to thank the Prof. CH YANG for providing some valuable comments and Mr. MC Tsai for offering the part of simulations.

References

  1. 1.
    Khan MA, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411CrossRefGoogle Scholar
  2. 2.
    Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. Journal of Information Security and Applications 38:8–27CrossRefGoogle Scholar
  3. 3.
    Singh S, Jeong YS, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222CrossRefGoogle Scholar
  4. 4.
    Subramanian N, Jeyaraj A (Oct. 2018) Recent security challenges in cloud computing. Comput Electr Eng 71:28–42CrossRefGoogle Scholar
  5. 5.
    Wang Y, Nakao A, Vasilakos AV, Ma J (2011) P2P soft security: on evolutionary dynamics of P2P incentive mechanism. Comput Commun 34(3):241–249CrossRefGoogle Scholar
  6. 6.
    Li J, Wu J, Chen L (Oct. 2018) Block-secure: Blockchain based scheme for secure P2P cloud storage. Inf Sci 465:219–231CrossRefGoogle Scholar
  7. 7.
    Gouri MS, Balan RVS (2017) Enhancement of multimedia security using random permutation with wavelet function. Comput Electr Eng 63:41–52CrossRefGoogle Scholar
  8. 8.
    Rocha A, Li S, Kuo CCJ, Piva A, Huang J (2018) Data-driven multimedia forensics and security. J Vis Commun Image Represent 55:447–448CrossRefGoogle Scholar
  9. 9.
    Tsai YY, Tsai DS, Liu CL (2013) Reversible data hiding scheme based on neighboring pixel differences. Digital Signal Processing 23(3):919–927MathSciNetCrossRefGoogle Scholar
  10. 10.
    Hussain M, Wahab AWA, Ho ATS, Javed N, Jung KH (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57CrossRefGoogle Scholar
  11. 11.
    Govind PVS, Sajila MK, Varghese BM (2016) A two stage data hiding scheme with high capacity based on interpolation and difference expansion. Procedia Technology 24:1311–1316CrossRefGoogle Scholar
  12. 12.
    C VK, V N (2016) Hybrid local prediction error-based difference expansion reversible watermarking for medical images. Comput Electr Eng 53:333–345CrossRefGoogle Scholar
  13. 13.
    Xuan G, Li X, Shi YQ (2018) Histogram-pair based reversible data hiding via searching for optimal four thresholds. Journal of Information Security and Applications 39:58–67CrossRefGoogle Scholar
  14. 14.
    Li M, Li Y (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196CrossRefGoogle Scholar
  15. 15.
    Hou D, Wang H, Zhang W, Yu N (2018) Reversible data hiding in JPEG image based on DCT frequency and block selection. Signal Process 148:41–47CrossRefGoogle Scholar
  16. 16.
    Lin YK (2014) A data hiding scheme based upon DCT coefficient modification. Computer Standards & Interfaces 36(5):855–862CrossRefGoogle Scholar
  17. 17.
    Qin C, Hu YC (2016) Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process 129:48–55CrossRefGoogle Scholar
  18. 18.
    Chang CC, Nguyen TS, Lin MC, Lin CC (2016) A novel data-hiding and compression scheme based on block classification of SMVQ indices. Digital Signal Processing 51:142–155MathSciNetCrossRefGoogle Scholar
  19. 19.
    Wang WJ, Huang CT, Tsuei SR, Wang SJ (2016) A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences. Multimed Tools Appl 75(22):14895–14916CrossRefGoogle Scholar
  20. 20.
    Linde Y, Buzo A, Gray R (1980) An algorithm for vector Quantizer design. IEEE Trans Commun 28(1):84–95CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Oriental Institute of TechnologyNew Taipei CityTaiwan

Personalised recommendations