Reversible data hiding scheme with high embedding capacity using semi-indicator-free strategy

Jiann Der Lee, Yaw Hwang Chiou, Jing Ming Guo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This work presents a novel reversible data-hiding scheme which embeds secret data into a side matched Vector Quantization (SMVQ)-compressed image, and achieves lossless reconstruction of a Vector Quantization (VQ)-compressed image. The rather random distributed histogram of a VQ-compressed image can be re-located to locations close to zero by SMVQ prediction. Thus, fewer bits can be used to encode SMVQ indices with very small values, and no indicator is required to encode these indices, which yields extra hiding space to hide secret data. Consequently, high embedding capacity and low bit rate scenarios can be deposited. Experimental results demonstrate the effectiveness and reversibility of the proposed scheme. Moreover, in terms of the embedding rate, the bit rate, and the embedding capacity, experimental results show that the performance of the proposed scheme is better than those of the former data hiding schemes for VQ-based and VQ/SMVQ-based compressed images.

Original languageEnglish
Title of host publication2013 IEEE Workshop on Signal Processing Systems, SiPS 2013
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages295-300
Number of pages6
ISBN (Print)9781467362382
DOIs
StatePublished - 2013
Event2013 IEEE Workshop on Signal Processing Systems, SiPS 2013 - Taipei, Taiwan
Duration: 16 10 201318 10 2013

Publication series

NameIEEE Workshop on Signal Processing Systems, SiPS: Design and Implementation
ISSN (Print)1520-6130

Conference

Conference2013 IEEE Workshop on Signal Processing Systems, SiPS 2013
Country/TerritoryTaiwan
CityTaipei
Period16/10/1318/10/13

Keywords

  • Data hiding
  • Side matched Vector Quantization

Fingerprint

Dive into the research topics of 'Reversible data hiding scheme with high embedding capacity using semi-indicator-free strategy'. Together they form a unique fingerprint.

Cite this