VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements

被引:11
作者
Huang, Cheng-Ta [1 ]
Tsai, Min-Yi [2 ]
Lin, Li-Chiun [3 ]
Wang, Wei-Jen [4 ]
Wang, Shiuh-Jeng [5 ]
机构
[1] Oriental Inst Technol, Dept Informat Management, New Taipei 220, Taiwan
[2] Chunghwa Telecom Co Ltd, Telecommun Labs, Cloud Comp Lab, Taoyuan 326, Taiwan
[3] Cent Police Univ, Dept Informat Management, Informat Cryptol Construct Lab, Taoyuan 333, Taiwan
[4] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan 320, Taiwan
[5] Cent Police Univ, Dept Informat Management, Taoyuan 333, Taiwan
关键词
Data hiding; Vector quantization; Least significant bit; Steganalysis; Internet of things; IMAGE AUTHENTICATION; SCHEME; COMPRESSION;
D O I
10.1007/s11227-016-1874-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things (IoT) realizes the concept of bringing things connected together. Data are exchanged and controlled within one or more IoT networks. Sensitive data transferred between different IoT networks may also lead to data leakage. One way to reduce the risk of these problems is to employ steganography while delivering secret information over the IoT networks. This paper presents a steganographic scheme that employs vector quantization (VQ) transformation and the least significant bits (LSB) to embed secret data into a cover image. We devise a new technique, namely two-level encoding, to separate the pixels of a VQ-transformed image block into two groups, the LSB group and the secret data group, in the first level. Then we use an indirect approach that embeds VQ indexes in the LSB group and secret data in the secret data group in the second level. The embedded VQ indexes are used to represent the VQ-transformed image blocks, and the secret data are used as the difference values to adjust the VQ-transformed image blocks and to create stego-image blocks, such that the stego-image blocks become more similar to the original image blocks after embedding. Compared with other similar work, the experimental results show that the proposed scheme produces stego-images with slightly better quality in terms of PSNR; the experimental results also indicate that it provides about ten times as large as the embedding capacity of the prior similar schemes. Moreover, the proposed scheme is able to pass the popular detections, such as Chi-square test and AUMP LSB, both to detect whether an image uses LSB for data hiding.
引用
收藏
页码:4295 / 4314
页数:20
相关论文
共 8 条
  • [1] VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements
    Cheng-Ta Huang
    Min-Yi Tsai
    Li-Chiun Lin
    Wei-Jen Wang
    Shiuh-Jeng Wang
    The Journal of Supercomputing, 2018, 74 : 4295 - 4314
  • [2] An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering
    Wu, Ming-Ni
    Juang, Puu-An
    Li, Yu-Chiang
    HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 73 - +
  • [3] Adaptive encoding based lossless data hiding method for VQ compressed images using tabu search
    Weng, Shaowei
    Zhang, Tiancong
    Wu, Zhijie
    Lin, Juan
    Hong, Wien
    INFORMATION SCIENCES, 2022, 602 : 128 - 142
  • [4] A Two-Level Flow-Based Anomalous Activity Detection System for IoT Networks
    Ullah, Imtiaz
    Mahmoud, Qusay H.
    ELECTRONICS, 2020, 9 (03)
  • [5] Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding
    Weng, Shaowei
    Pan, Jeng-shyang
    Li, Leida
    INFORMATION SCIENCES, 2016, 369 : 144 - 159
  • [6] Reference pixel-based reversible data hiding scheme using multi-level pixel value ordering
    Meikap, Sudipta
    Jana, Biswapati
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (06) : 16895 - 16928
  • [7] Reference pixel-based reversible data hiding scheme using multi-level pixel value ordering
    Sudipta Meikap
    Biswapati Jana
    Multimedia Tools and Applications, 2024, 83 : 16895 - 16928
  • [8] A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition
    Ma, Bin
    Du, Kaixin
    Xu, Jian
    Wang, Chunpeng
    Li, Jian
    Zhou, Linna
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78