Professional Documents
Culture Documents
org
ISSN 1751-9659
Abstract: In this paper, the authors propose a new steganographic scheme based on vector quantisation (VQ) and
search-order coding (SOC).The capacity of the proposed scheme is higher than others based on VQ and the quality of
stego-image is acceptive. In general, the capacity of the schemes based on VQ is usually 1-bit per block. In 2004, Yu
et al. proposed a scheme to increase the capacity to 3-bit per pair of blocks. In the proposed scheme, the authors
utilised multiple codebooks and chose the combinations of per pair of blocks, to embed the secret data.The capacity
was increased to 6-bit per pair of blocks, and the quality was identical Yu et al.’s scheme.
IET Image Process., 2009, Vol. 3, Iss. 4, pp. 243 – 248 243
doi: 10.1049/iet-ipr.2008.0251 & The Institution of Engineering and Technology 2009
Authorized licensed use limited to: Sree Vidyanikethan Engineering College. Downloaded on August 02,2010 at 05:37:22 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org
2 Preliminaries
2.1 VQ
VQ is a technique which can be used to compress the size of
image. As it is a low-bit-rate and lossy compression, VQ can
efficiently reduce the size of the image.
2.2 SOC SP like SP (2, 2), (2, 4) and (3, 1). If their values had been
The SOC algorithm which was a compression for VQ noted before, they would be neglected. If no SP is equal to
indices was proposed by Hsieh and Tsai in 1996 [16]. The 53, the search centre will be noted as the original VQ index
authors found that it was easy to identify the blocks with value (00110101)2 (¼53) and a 1-bit indicator (1)2 will be
the same index around its neighbours in VQ indices table. added in front of the VQ index value.
244 IET Image Process., 2009, Vol. 3, Iss. 4, pp. 243– 248
& The Institution of Engineering and Technology 2009 doi: 10.1049/iet-ipr.2008.0251
Authorized licensed use limited to: Sree Vidyanikethan Engineering College. Downloaded on August 02,2010 at 05:37:22 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org
codewords by executing a VQ procedure, then make four belong to CB4 . From these codebooks we then obtain a
copies of that codebook and note them as CB1 , CB2 , CB3 super codebook with 256 codewords. Now, including the
and CB4 . These codebooks have the same codewords but idea of SOC, we will have eight choices for each block,
the indices are different, 0 63 belong to CB1 , 64 127 that is, (CB1 , CB2 , CB3 , CB4) by using VQ coding and
belong to CB2 , 128 191 belong to CB3 and 192 255 (CB1 , CB2 , CB3 , CB4) by using SOC coding. Enlarging
Case 6-bits secret data First block Second block Case 6-bits secret data First block Second block
01 (000000)2 CB1(VQ) CB1(VQ) 33 (100000)2 CB3(VQ) CB1(VQ)
02 (000001)2 CB1(VQ) CB1(SOC) 34 (100001)2 CB3(VQ) CB1(SOC)
03 (000010)2 CB1(VQ) CB2(VQ) 35 (100010)2 CB3(VQ) CB2(VQ)
04 (000011)2 CB1(VQ) CB2(SOC) 36 (100011)2 CB3(VQ) CB2(SOC)
05 (000100)2 CB1(VQ) CB3(VQ) 37 (100100)2 CB3(VQ) CB3(VQ)
06 (000101)2 CB1(VQ) CB3(SOC) 38 (100101)2 CB3(VQ) CB3(SOC)
07 (000110)2 CB1(VQ) CB4(VQ) 39 (100110)2 CB3(VQ) CB4(VQ)
08 (000111)2 CB1(VQ) CB4(SOC) 40 (100111)2 CB3(VQ) CB4(SOC)
09 (001000)2 CB1(SOC) CB1(VQ) 41 (101000)2 CB3(SOC) CB1(VQ)
10 (001001)2 CB1(SOC) CB1(SOC) 42 (101001)2 CB3(SOC) CB1(SOC)
11 (001010)2 CB1(SOC) CB2(VQ) 43 (101010)2 CB3(SOC) CB2(VQ)
12 (001011)2 CB1(SOC) CB2(SOC) 44 (101011)2 CB3(SOC) CB2(SOC)
13 (001100)2 CB1(SOC) CB3(VQ) 45 (101100)2 CB3(SOC) CB3(VQ)
14 (001101)2 CB1(SOC) CB3(SOC) 46 (101101)2 CB3(SOC) CB3(SOC)
15 (001110)2 CB1(SOC) CB4(VQ) 47 (101110)2 CB3(SOC) CB4(VQ)
16 (001111)2 CB1(SOC) CB4(SOC) 48 (101111)2 CB3(SOC) CB4(SOC)
17 (010000)2 CB2(VQ) CB1(VQ) 49 (110000)2 CB4(VQ) CB1(VQ)
18 (010001)2 CB2(VQ) CB1(SOC) 50 (110001)2 CB4(VQ) CB1(SOC)
19 (010010)2 CB2(VQ) CB2(VQ) 51 (110010)2 CB4(VQ) CB2(VQ)
20 (010011)2 CB2(VQ) CB2(SOC) 52 (110011)2 CB4(VQ) CB2(SOC)
21 (010100)2 CB2(VQ) CB3(VQ) 53 (110100)2 CB4(VQ) CB3(VQ)
22 (010101)2 CB2(VQ) CB3(SOC) 54 (110101)2 CB4(VQ) CB3(SOC)
23 (010110)2 CB2(VQ) CB4(VQ) 55 (110110)2 CB4(VQ) CB4(VQ)
24 (010111)2 CB2(VQ) CB4(SOC) 56 (110111)2 CB4(VQ) CB4(SOC)
25 (011000)2 CB2(SOC) CB1(VQ) 57 (111000)2 CB4(SOC) CB1(VQ)
26 (011001)2 CB2(SOC) CB1(SOC) 58 (111001)2 CB4(SOC) CB1(SOC)
27 (011010)2 CB2(SOC) CB2(VQ) 59 (111010)2 CB4(SOC) CB2(VQ)
28 (011011)2 CB2(SOC) CB2(SOC) 60 (111011)2 CB4(SOC) CB2(SOC)
29 (011100)2 CB2(SOC) CB3(VQ) 61 (111100)2 CB4(SOC) CB3(VQ)
30 (011101)2 CB2(SOC) CB3(SOC) 62 (111101)2 CB4(SOC) CB3(SOC)
31 (011110)2 CB2(SOC) CB4(VQ) 63 (111110)2 CB4(SOC) CB4(VQ)
32 (011111)2 CB2(SOC) CB4(SOC) 64 (111111)2 CB4(SOC) CB4(SOC)
IET Image Process., 2009, Vol. 3, Iss. 4, pp. 243 – 248 245
doi: 10.1049/iet-ipr.2008.0251 & The Institution of Engineering and Technology 2009
Authorized licensed use limited to: Sree Vidyanikethan Engineering College. Downloaded on August 02,2010 at 05:37:22 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org
the idea to pairs of blocks, there will be 64 combinations VQ. Then the receiver will find that the indicator is (0)2 in
which can be used. Finally, an embedding table for the the second block, it means this is a SOC code, and the
6-bit secret data is created, shown in Table 1. This table code is (10)2 . The receiver can find that the VQ code is
can be created as you wish and it must be shared between 250 ¼ (11111010)2 by executing a SOC search. The
the sender and the receiver. receiver knows that it is an index in CB4 after looking up
the super codebook. The receiver obtain the first block
The embedding procedure is described as follows: coded by CB1 with VQ and the second block coded by
CB4 with SOC; then the receiver will find that the secret
1. For example, assume that a sender wants to embed data are (000111)2 in this pair of blocks by looking for the
(000111)2 in a pair of blocks. According to Table 1, he/ embedding table.
she can find that (000111)2 is in the eighth case, the
encoding choices of the first block and second block are
CB1 with VQ and CB4 with SOC, respectively. 4 Comparison
As we know, the key issues in steganography are how to
2. Search the index of the first block in CB1 , suppose it is embed more secret data and still maintain the stego-
60 ¼ (00111100)2 , and add a 1-bit indicator (1)2 in front image’s good quality. The comparisons of embedding
of the index to indicate it that is a VQ code. (100111100)2 capacity and image quality of Chang et al.’s [1] scheme, Yu
is the final code of the first block. et al.’s [15] scheme and our proposed scheme are as follows.
3. Search the index of the second block in CB4 , suppose it is To compare the performance, the six gray-scale 512 512
250 ¼ (11111010)2 , then the sender finds the SOC code, host images are toys, couple, boats, barbara, baboon and
that is (10)2 , by executing SOC search. Add a 1-bit peppers, with the results shown in Table 2 [16]. According
indicator (0)2 in front of the index to indicate that it is a to the experimental results, we can find that the embedding
SOC code. (010)2 is the final code of the second block. capacity of the proposed scheme is twice as good as Yu
et al.’s scheme. The average capacity of our proposed
4. Execute (1), (2) and (3) until all the secret data are scheme is 49 152 bits, whereas Yu et al.’s scheme is 24 576
embedded. only.
5. Send the super codebook and all the codes to the receiver. The common way to compare the quality of two images is
to compute the peak signal to noise ratio (PSNR), the
3.2 Extracting procedure formula is as follows:
Note that the sender and the receiver share the embedding
table and the super codebook is transmitted with those 2552
PSNR ¼ 10 log10 (dB)
codes after the embedding procedure. To continue the MSE
example in the embeddiing procedure, the receiver will find
that the indicator is (1)2 in the first block when the receiver where
wants to extract the secret data. It means that this is a VQ
code, and the code is 60 ¼ (00111100)2 . The receiver can M1
X NX1
1
look up the super codebook and find out that it is an index MSE ¼ (P(i, j) P 0 (i, j))2
M N i¼0 j¼0
in CB1 . Note that the first block is coded by CB1 with
246 IET Image Process., 2009, Vol. 3, Iss. 4, pp. 243– 248
& The Institution of Engineering and Technology 2009 doi: 10.1049/iet-ipr.2008.0251
Authorized licensed use limited to: Sree Vidyanikethan Engineering College. Downloaded on August 02,2010 at 05:37:22 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org
and M is the length of image, N is the width of image, P (i, j) [4] CHAN C.K., CHENG L.M.: ‘Hiding data in images by
is the value of the host image in pixel (i, j) and P 0 (i, j) is the simple LSB substitution’, Pattern Recognit., 2004, 37, (3),
value of the stego-image in pixel (i, j) [2]. The larger the pp. 469– 474
value of PSNR, the better the image quality will be. The
comparisons of image quality are shown in Table 3 [16]. [5] CHANG C.C., HSIAO J.Y., CHAN C.S.: ‘Finding optimal least-
The results show that the image quality of the proposed significant-bit substitution in image hiding by dynamic
scheme is the same as Yu et al.’s scheme, because programming strategy’, Pattern Recognit., 2003., 36, (7),
SOC is an undistorted coding, the image quality will not pp. 1583 – 1595
be affected.
[6] CHANG C.C., TSENG H.W.: ‘A steganographic method for
digital images using side-match’, Pattern Recognit. Lett.,
5 Conclusions 2004, 25, (12), pp. 1431 – 1437
A high capacity data hiding scheme for VQ compressed
[7] KER A.D.: ‘Steganalysis of LSB matching in
image is presented in this paper. The proposed scheme can
grayscale images’, IEEE Signal Process. Lett., 2005, 12,
embed 6-bit secret data for per pair for VQ blocks, and the
pp. 441– 444
image quality is the same as the Yu et al.’s schemes. The
proposed scheme can fend off the image compression
[8] MIELIKAINEN J.: ‘LSB matching revisited’, IEEE Signal
attack, which is a common problem in those data hiding
Process. Lett., 2006, 13, pp. 285– 287
schemes used in the spatial domain.
[9] WANG R.Z., LIN C.F., LIN J.C.: ‘Image hiding by optimal LSB
substitution and genetic algorithm’, Pattern Recognit.,
6 Acknowledgment 2001, 34, (3), pp. 671– 683
This research was partially supported by the National Science
Council, Taiwan, Republic of China under contract no.: [10] WU D.C., TSAI W.H.: ‘A steganographic method for images
NSC97-2218-E-468-010. by pixel-value differencing’, Pattern Recognit. Lett., 2003,
24, (9– 10), pp. 1613 – 1626
[3] BENDER W., GRUHL D., MORIMOTO N., LU A. : ‘Techniques [13] JO M., KIM H.D.: ‘A digital image watermarking scheme
for data hiding’, IBM Syst. J., 1996, 35, (3 – 4), based on vector quantisation’, IEICE Trans. Inf. Syst., 2002,
pp. 313– 336 E85-D, (6), pp. 1054 – 1056
IET Image Process., 2009, Vol. 3, Iss. 4, pp. 243 – 248 247
doi: 10.1049/iet-ipr.2008.0251 & The Institution of Engineering and Technology 2009
Authorized licensed use limited to: Sree Vidyanikethan Engineering College. Downloaded on August 02,2010 at 05:37:22 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org
[14] LINDE Y., BUZO A., GRAY R.M.: ‘An algorithm for vector Intelligent Multimedia, Video and Speech Processing,
quantiser design’, IEEE Trans. Commun., 1980, 28, (1), Hong Kong, August 2004, pp. 358– 361
pp. 84–95
[16] HSIEH C.H., TSAI J.C.: ‘Lossless compression of VQ index
[15] YU Y.H., CHANG C.C., HU Y.C.: ‘A steganographic method for with search-order coding’, IEEE Trans. Image Process.,
hiding data in VQ encoded images’. Proc. 2004 Int. Symp. 1996, 5, pp. 1579 – 1582
248 IET Image Process., 2009, Vol. 3, Iss. 4, pp. 243– 248
& The Institution of Engineering and Technology 2009 doi: 10.1049/iet-ipr.2008.0251
Authorized licensed use limited to: Sree Vidyanikethan Engineering College. Downloaded on August 02,2010 at 05:37:22 UTC from IEEE Xplore. Restrictions apply.