Secure image hiding scheme based upon vector quantization

被引:8
作者
Hu, YC [1 ]
Lin, MH [1 ]
机构
[1] Providence Univ, Dept Comp Sci & Informat Management, Taichung 433, Taiwan
关键词
steganography; image hiding; LSB substitution; vector quantization; DES;
D O I
10.1142/S0218001404003526
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a novel gray-level image-hiding scheme is proposed. The goal of this scheme is to hide multiple important gray-level images into another meaningful graylevel image. The secret images to be protected are first compressed using the vector quantization scheme. Then, the DES cryptosystem is conducted on the VQ indices and related parameters to generate the encrypted message. Finally, the encrypted message is embedded into the rightmost two bits of each pixel in the cover image. According to the experimental results, average image qualities of 44.320 dB and 30.885 dB are achieved for the embedded images and the retrieved secret images, respectively. In other words, multiple secret images can be effectively hidden into one host image of the same size. In addition, the proposed scheme strengthens the protection of the secret images by conducting the DES cryptosystem on the related parameters and the VQ indices of the compressed secret images. Therefore, the proposed scheme provides a secure approach to embed multiple important images into another meaningful image of the same size.
引用
收藏
页码:1111 / 1130
页数:20
相关论文
共 26 条
[1]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[2]   Digital steganography: Hiding data within data [J].
Artz, D .
IEEE INTERNET COMPUTING, 2001, 5 (03) :75-80
[3]   Secure delivery of images over open networks [J].
Augot, D ;
Boucqueau, JM ;
Delaigle, JF ;
Fontaine, C ;
Goray, E .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1251-1266
[4]   A DCT-domain system for robust image watermarking [J].
Barni, M ;
Bartolini, F ;
Cappellini, V ;
Piva, A .
SIGNAL PROCESSING, 1998, 66 (03) :357-372
[5]  
Bender W., 1995, Proceedings of the SPIE - The International Society for Optical Engineering, V2420, P164, DOI 10.1117/12.205315
[6]   A fast and secure image hiding scheme based on LSB substitution [J].
Chang, CC ;
Lin, MH ;
Hu, YC .
INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2002, 16 (04) :399-416
[7]  
Chang CC, 1998, IEEE T CONSUM ELECTR, V44, P1201
[8]   A virtual image cryptosystem based upon vector quantization [J].
Chen, TS ;
Chang, CC ;
Hwang, MS .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1998, 7 (10) :1485-1488
[9]   Invisibility and application functionalities in perceptual watermarking - An overview [J].
De Vleeschouwer, C ;
Delaigle, JF ;
Macq, B .
PROCEEDINGS OF THE IEEE, 2002, 90 (01) :64-77
[10]  
Denning DER, 1983, CRYPTOGRAPHY DATA SE