An optimal high capacity reversible data hiding scheme using move to front coding for LZW codes

被引:18
作者
Kumar, Rajeev [1 ]
Chand, Satish [2 ]
Singh, Samayveer [3 ]
机构
[1] Kyungil Univ, Dept Cyber Secur, Gyongsan, South Korea
[2] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi, India
[3] Natl Inst Technol, Dept Comp Sci & Engn, Jalandhar, Punjab, India
关键词
Reversible data hiding; Move to front; LZW codes; Data hiding; Compression; PERFORMANCE;
D O I
10.1007/s11042-019-7640-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reversible Data hiding techniques reduce transmission cost as secret data is embedded into a cover image without increasing its size in such a way that at the receiving end, both secret data and the cover image can be extracted and recovered, respectively, to their original form. To further reduce the transmission cost, the secret data can be embedded in the compression codes by some popular reversible data hiding schemes. One of the popular and important reversible data hiding method is high- performance data-hiding Lempel-Ziv-Welch (HPDH-LZW) scheme which hides the secret data in LZW codes. In this paper, the HPDH-LZW scheme is modified in order to increase its hiding capacity and compression ratio. First, the proposed work modifies the Move to Front (MTF) encoding technique to hide the secret data and also to increase the similarity among the element of the cover media. Then, LZW encoding technique is applied on the resultant cover data to obtain LZW codes, which are used to hide further secret data. Experimental results show that the proposed scheme has significantly increased the data hiding capacity and have good embedding and extraction speed in comparison to other state of the art schemes.
引用
收藏
页码:22977 / 23001
页数:25
相关论文
共 27 条
  • [1] Aabed MA, 2007, ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, P756
  • [2] A LOCALLY ADAPTIVE DATA-COMPRESSION SCHEME
    BENTLEY, JL
    SLEATOR, DD
    TARJAN, RE
    WEI, VK
    [J]. COMMUNICATIONS OF THE ACM, 1986, 29 (04) : 320 - 330
  • [3] Chang C. C., 2009, INT J COMPUTER SCI E, V3, P55
  • [4] Chang C-C., 2018, INT J NETWORK SECUR, V20, P478
  • [5] A reversible data hiding scheme based on side match vector quantization
    Chang, Chin-Chen
    Tai, Wei-Liang
    Lin, Chia-Chen
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (10) : 1301 - 1308
  • [6] Reversible index-domain information hiding scheme based on side-match vector quantization
    Chang, Chin-Chen
    Lu, Tzu-Chuen
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (08) : 1120 - 1129
  • [7] A reversible data hiding scheme using complementary embedding strategy
    Chang, Chin-Chen
    The Duc Kieu
    [J]. INFORMATION SCIENCES, 2010, 180 (16) : 3045 - 3058
  • [8] Chang-Chu Chen, 2010, Proceedings 2010 Second International Conference on Computer Modeling and Simulation (ICCMS), P3, DOI 10.1109/ICCMS.2010.346
  • [9] Reversible steganographic method using SMVQ approach based on declustering
    Chin-Chen Chang
    Chih-Yang Lin
    [J]. INFORMATION SCIENCES, 2007, 177 (08) : 1796 - 1805
  • [10] Reversible data hiding in low complexity and high quality compression scheme
    Guo, Jing-Ming
    Tsai, Jia-Jin
    [J]. DIGITAL SIGNAL PROCESSING, 2012, 22 (05) : 776 - 785