Lossless steganography for AMBTC-compressed images

被引:37
作者
Hong, Wien [1 ]
Chen, Tung-Shou [2 ]
Shiu, Chih-Wei [1 ]
机构
[1] Yu Coll Business, Dept Informat Management, Miaoli 361, Taiwan
[2] Natl Taichung Inst Technol, Dept Comp Sci & Informat Technol, Taichung 404, Taiwan
来源
CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS | 2008年
关键词
D O I
10.1109/CISP.2008.638
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A lossless or reversible steganography is defined as an original image can be completely recovered from the stego-image after the embedded data has been extracted. This technique has been focused on spatial uncompressed domain recently, and is considered more challenging to carry out in the compressed domain. In this paper, we propose a lossless, compressed domain steganography technique for AMBTC-compressed images based on the interchange of two quantization levels. The location map, which is often used in lossless steganography, is not required in our scheme. Therefore, the hiding capacity is independent of the compressed codes. Moreover, the stego-image preserves the same image quality as the original compressed images. The experimental results show that the proposed scheme is not only easy to implement but also provides an efficient mechanism for lossless data embedding.
引用
收藏
页码:13 / +
页数:3
相关论文
共 11 条
[1]   Lossless generalized-LSB data embedding [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM ;
Saber, E .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (02) :253-266
[2]   A steganographic method based upon JPEG and quantization table modification [J].
Chang, CC ;
Chen, TS ;
Chung, LZ .
INFORMATION SCIENCES, 2002, 141 (1-2) :123-138
[3]   Reversible data hiding in the VQ-compressed domain [J].
Chang, Chin-Chen ;
Chou, Yung-Chen ;
Lin, Chih-Yang .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2007, E90D (09) :1422-1429
[4]   Reversible steganography for VQ-compressed images using side matching and relocation [J].
Chang, Chin-Chen ;
Lin, Chih-Yang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (04) :493-501
[5]   ABSOLUTE MOMENT BLOCK TRUNCATION CODING AND ITS APPLICATION TO COLOR IMAGES [J].
LEMA, MD ;
MITCHELL, OR .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1984, 32 (10) :1148-1157
[6]   Secret image sharing with steganography and authentication [J].
Lin, CC ;
Tsai, WH .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) :405-414
[7]   A hierarchical digital watermarking method for image tamper detection and recovery [J].
Lin, PL ;
Hsieh, CK ;
Huang, PW .
PATTERN RECOGNITION, 2005, 38 (12) :2519-2529
[8]   Reversible data hiding [J].
Ni, ZC ;
Shi, YQ ;
Ansari, N ;
Su, W .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (03) :354-362
[9]   Information hiding - A survey [J].
Petitcolas, FAP ;
Anderson, RJ ;
Kuhn, MG .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1062-1078
[10]   A semi-blind digital watermarking scheme based on singular value decomposition [J].
Shieh, JM ;
Lou, DC ;
Chang, MC .
COMPUTER STANDARDS & INTERFACES, 2006, 28 (04) :428-440