Secure image hiding scheme based upon vector quantization

被引:8
作者
Hu, YC [1 ]
Lin, MH [1 ]
机构
[1] Providence Univ, Dept Comp Sci & Informat Management, Taichung 433, Taiwan
关键词
steganography; image hiding; LSB substitution; vector quantization; DES;
D O I
10.1142/S0218001404003526
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a novel gray-level image-hiding scheme is proposed. The goal of this scheme is to hide multiple important gray-level images into another meaningful graylevel image. The secret images to be protected are first compressed using the vector quantization scheme. Then, the DES cryptosystem is conducted on the VQ indices and related parameters to generate the encrypted message. Finally, the encrypted message is embedded into the rightmost two bits of each pixel in the cover image. According to the experimental results, average image qualities of 44.320 dB and 30.885 dB are achieved for the embedded images and the retrieved secret images, respectively. In other words, multiple secret images can be effectively hidden into one host image of the same size. In addition, the proposed scheme strengthens the protection of the secret images by conducting the DES cryptosystem on the related parameters and the VQ indices of the compressed secret images. Therefore, the proposed scheme provides a secure approach to embed multiple important images into another meaningful image of the same size.
引用
收藏
页码:1111 / 1130
页数:20
相关论文
共 26 条
  • [1] On the limits of steganography
    Anderson, RJ
    Petitcolas, FAP
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) : 474 - 481
  • [2] Digital steganography: Hiding data within data
    Artz, D
    [J]. IEEE INTERNET COMPUTING, 2001, 5 (03) : 75 - 80
  • [3] Secure delivery of images over open networks
    Augot, D
    Boucqueau, JM
    Delaigle, JF
    Fontaine, C
    Goray, E
    [J]. PROCEEDINGS OF THE IEEE, 1999, 87 (07) : 1251 - 1266
  • [4] A DCT-domain system for robust image watermarking
    Barni, M
    Bartolini, F
    Cappellini, V
    Piva, A
    [J]. SIGNAL PROCESSING, 1998, 66 (03) : 357 - 372
  • [5] Bender W., 1995, Proceedings of the SPIE - The International Society for Optical Engineering, V2420, P164, DOI 10.1117/12.205315
  • [6] A fast and secure image hiding scheme based on LSB substitution
    Chang, CC
    Lin, MH
    Hu, YC
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2002, 16 (04) : 399 - 416
  • [7] Chang CC, 1998, IEEE T CONSUM ELECTR, V44, P1201
  • [8] A virtual image cryptosystem based upon vector quantization
    Chen, TS
    Chang, CC
    Hwang, MS
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1998, 7 (10) : 1485 - 1488
  • [9] Invisibility and application functionalities in perceptual watermarking - An overview
    De Vleeschouwer, C
    Delaigle, JF
    Macq, B
    [J]. PROCEEDINGS OF THE IEEE, 2002, 90 (01) : 64 - 77
  • [10] Denning DER, 1983, CRYPTOGRAPHY DATA SE