Advanced Side-Match Vector Quantization and Image Inpainting Used For Data Hiding and Compression

Yashasri Y. Satpute, N. R. Pardeshi

Abstract


Two different techniques of side-match vector
quantization and image inpainting are proposed for compressing and
then concealing the secret data. The process of covering up the data
includes hiding the private or secret data which could be in the form
of an image, or an audio or video. The two techniques of
compression and hiding are combined as a specific module.
At the sender’s side, all the blocks except in the uppermost row and
the leftmost column, are embedded with some secret data and are
compressed simultaneously. This is done by either SMVQ or image
inpainting and an indicator bit 1 is appended to it. The blocks in the
topmost row and the leftmost column are considered as the complex
blocks and are compressed using the vector quantization (VQ) and
an indicator bit 0 is appended to it. The indicator bits are used for
segmenting the compressed blocks into sections. Based on the index
value of each segmented section, extraction of secret bits and the
decompression of the image can be done at the receiver side.

Full Text:

PDF

References


C. C. Chang, T. S. Chen, and L. Z. Chung, “A Steganographic method based

upon JPEG and quantization table modification,” Inf. Sci., vol. 141, no. 1, pp.

–138, 2002.

P. C. Su and C. C. Kuo, “Steganography in JPEG2000 compressed images,”

IEEE Trans. Consum. Electron., vol. 49, no. 4, pp. 824–832, Nov. 2002.

W. J. Wang, C. T. Huang and S. J. Wang, “VQ applications in Stegano

graphic data hiding upon multimedia images,” IEEE Syst. J., vol. 5, no. 4, pp.

–537, Dec. 2002.

Y. C. Hu, “High-capacity image hiding scheme based on vector

quantization,” Pattern Recognit., vol. 39, no. 9, pp. 1715–1724, 2006.

W. C. Du and W. J. Hsu, “Adaptive data hiding based on VQ compressed

images,” IEEE Proc. Vis., Image Signal Process., vol. 150, no. 4,pp. 233-238,

Aug. 2003.

Chin-Chen Chang, Tzu-Chuen Lu, “Reversible index-domain information

hiding scheme based on side-match vector quantization,” The Journal of Systems

and Software 79 (2006) 1120–1129.

C. H. Yang and Y. C. Lin, “Fractal curves to improve the reversible data

embedding for VQindexes based on locally adaptive coding,” J. Vis. Commun.

Image Represent. vol. 21, no. 4, pp. 334– 342, 2010.

Y. P. Hsieh, C. C. Chang, and L. J. Liu, “A twocodebook combination and

three-phase block matching based image-hiding scheme with high embedding

capacity,” Pattern Recognit., vol. 41, no. 10, pp. 3104–3113, 2008.

C. C. Lin, S. C. Chen, and N. L. Hsueh,“Adaptive embedding techniques for

VQ-compressed images,” Inf. Sci., vol. 179, no. 3, pp. 140–149,2009.

Chin–Feng Lee, Hsing-Ling Chen, “An adaptive data hiding scheme with

high embedding capacity and visual image quality based on SMVQ prediction

through classification codebooks,” Image and Vision computing 28(2010)1293-

C.C. Chang, T.S. Nguyen, C.C. Lin, “A reversible data hiding scheme for

VQ indices using locally adaptive coding,” J. Vis. Commun. Image

Representation 22 (2011) 664–672.

Zhi-Hui Wanga, Chin-Feng Leeb, Ching-Yun Chang,“Histogram-shifting

imitated reversible data hiding,” The Journal of Systems and Software 86 (2013)

– 323.

Lingfei Wang, Zhibin Pan, Xiaoxiao Ma, Sen Hu, “A novel high

performance reversible data hiding scheme using SMVQ and improved locally

adaptive coding method,” J. Vis. Commun. Image R. 25 (2013) 454–465.

Chuan Qin, Chin-Chen Chang, “An inpaintingassisted reversible

steganographic scheme using a histogram shifting mechanism,” IEEE

Transactions on Circuits and Systems for Video Technology, vol. 23, no. 7, july

Sandeep kumar, Nidhi Garg, “A Survey on Joint Data-Hiding and

Compression Techniques based on SMVQ and Improved Locally Adaptive

Coding Method,” International Journal of Computer Applications (0975-8887)

Volume 96– No.20, June 2014.

Chuan Qin, Chin-Chen Chang and Yi-Ping Chiu, “A Novel Joint Data

Hiding and Compression Scheme Based on SMVQ and Image Inpainting,” IEEE

transactions on image processing, vol. 23, no. 3, march 2.


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology