skip to main content
10.1145/3614008.3614052acmotherconferencesArticle/Chapter ViewAbstractPublication PagesspmlConference Proceedingsconference-collections
research-article

Hiding Information in a Well-Trained Vector Quantization Codebook

Authors Info & Claims
Published:17 October 2023Publication History

ABSTRACT

Data hiding schemes can generally be categorized into four types: spatial-domain schemes, frequency-domain schemes, compression-domain schemes, and encryption-domain schemes. VQ or VQ variant compression techniques have been widely used by scholars to design data hiding approaches in the compression domain. Over the past two decades, the index tables generated by VQ or VQ variant-based compression techniques have served as the primary carriers for concealing confidential data.

However, while the codebook plays a crucial role in VQ or VQ variant compression techniques, its potential as a carrier besides index tables has not been explored. This paper introduces two strategies to extend the category of carriers for VQ or VQ variant-based data hiding. The first strategy, based on Tain et al.’s difference expansion (DE), is a lossy data hiding approach. The second strategy involves reordering indices and is a lossless data hiding strategy. Experimental results confirm that the second hiding strategy provides adaptive hiding capacity without raising suspicion from attackers. Although the first hiding strategy may introduce slight distortion when using the stego codebook to decode the VQ-compressed images, it does not result in the size expansion of the compression codes. In other words, our two proposed hiding strategies not only work together to carry secret data but can also individually collaborate with existing VQ or VQ variant-based data hiding schemes to further enhance the hiding capacity without introducing complex computations.

References

  1. C. C. Chang, G. M. Chen, M. H. Lin. 2004. Information hiding based on search-order coding for VQ indices. Pattern Recogn Lett 25(11):1253–1261Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. C. Chang, T. S. Nguyen, C. C. Lin. 2013. A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies. J Syst Softw 86:389–402Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Y. C. Lin, C. C. Wang. 1999. Digital images watermarking by vector quantization. Proc Natl Comput Symp 3:76–87Google ScholarGoogle Scholar
  4. Z. B. Pan, X. X. Ma, X. M. Deng, S. Hu. 2013. Low bit-rate information hiding method based on search-order-coding technique. J Syst Softw 86(11):2863–2869Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. W. J. Wang, C. T. Huang, C. M. Liu, P. C. Su, S. J. Wang. 2013. Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping. Inf Sci 246:69–82Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. C. Lin, X. L. Liu, S. M. Yuan. 2015. Reversible data hiding for VQ-compressed images based on search-order-coding and state-codebook mapping. Inf Sci 293:314–326Google ScholarGoogle ScholarCross RefCross Ref
  7. B. Xia, A. Wang, C. C. Chang, L. Liu. 2017. Reversible data hiding for VQ indices using hierarchical state codebook mapping. Multimed Tools Appl 77(16):20519–20533Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. C. Chang, T. S. Nguyen, C. C. Lin. 2015. A reversible compression code hiding using SOC and SMVQ indices. Inf Sci 300:85–99Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Tian. 2003. Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13(8): 890-896Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. M. Alattar. 2004. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing, 13(8): 1147-1156Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Y. Linde, A. Buzo, and R. Gray, 1980. “An algorithm for vector quantizer design,” IEEE Trans. Communication., 28(1): 84–95Google ScholarGoogle ScholarCross RefCross Ref
  12. Z. Ni, Y. Q. Shi, N. Ansari, W. Su. 2006. “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., 16(3): 354–362Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. I. C. Lin, M. S, Hwang, L. H. Li. 2003. "A new remote user authentication scheme for multi-server architecture", Future Generat. Comput. Syst., 19(1): 13-22Google ScholarGoogle ScholarCross RefCross Ref
  14. C. C. Chang C, F. C. Shine, F. C Chen. 2000. Pattern-based side match vector quantization for image compression, Imaging Science Journal, 48(2): 63-76Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SPML '23: Proceedings of the 2023 6th International Conference on Signal Processing and Machine Learning
    July 2023
    383 pages
    ISBN:9798400707575
    DOI:10.1145/3614008

    Copyright © 2023 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 October 2023

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)20
    • Downloads (Last 6 weeks)5

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format