36
Views
8
CrossRef citations to date
0
Altmetric
Original Article

A capacity‐enhanced reversible data hiding scheme based on SMVQ

, &
Pages 17-24 | Accepted 25 Jun 2010, Published online: 12 Nov 2013

REFERENCES

  • Amin PK, Liu N, Subbalakshmi KP. Statistical attack resilient data hiding. Int. J. Network Secur., 2007, 5, 112–120.
  • Barton JM. “Method and apparatus for embedding authentication information within digital data”, US Patent 5,646,997, 1997.
  • Chan CK, Cheng LM. Hiding data in images by simple LSB substitution. Patt. Recogn., 2004, 37, 469–474.
  • Chang CC, Kieu D, Chou YC. Reversible information hiding for VQ indices based on locally adaptive coding. J. Visual Commun. Image Represent., 2009, 20, 57–64.
  • Chang CC, Tai WL, Lin CC. A reversible data hiding scheme based on side match vector quantization. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, 1301–1308.
  • Chang CC, Wu WC. A steganographic method for hiding secret data using side match vector quantization. IEICE Trans. Inform. Syst., 2005, E88-D, 2159–2167.
  • Feng JB, Lin IC, Tsai CS, Chu YP. Reversible watermarking: current status and key issues. Int. J. Network Secur., 2006, 2, 161–170.
  • Gersho A, Gray RM. Vector Quantization and Signal Compression, 1992 (Kluwer Academic Publishers, Boston, MA).
  • Gray RM. “Vector quantization”, IEEE ASSP Mag., 1984, 1, 4–29.
  • Hsiao JY, Chen JF, Chang JM. An adaptive reversible information hiding method based on search-order coding for VQ-compressed images. Imag. Sci. J., 2009, 57, 37–45.
  • Kim T. Side match and overlap match vector quantizers for images. IEEE Trans. Image Process., 1992, 1, 170–185.
  • Lee CF, Chen KN, Chang CC. A new data hiding strategy with restricted region protection. Imag. Sci. J., 2009, 57, 235–249.
  • Liao Z, Huang Y, Li C. Research on data hiding capacity. Int. J. Network Secur., 2007, 5, 140–144.
  • Linde Y, Buzo A, Gray RM. An algorithm for vector quantizer design. IEEE Trans. Commun., 1980, 28, 84–95.
  • Liu Y, Sun X, Cox IJ, Wang H. Natural language information hiding based on Chinese mathematical expression. Int. J. Network Secur., 2009, 8, 10–15.
  • Pennebaker WB, Mitchell JL. The JPEG Still Image Data Compression Standard, 1993 (Kluwer Academic Publishers, Boston, CA).
  • Taubman DS, Marcellin MW. JPEG2000: Image Compression Fundamentals Standards and Practice, 2002 (Kluwer Academic Publishers, Boston, CA).
  • Wang CM, Wu N, Tsai CS, Hwang MS. A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Software, 2008, 81, 150–158.
  • Wu NI, Hwang MS. Data hiding: current status and key issues. Int. J. Network Secur., 2007, 4, 1–9.
  • Xinag S, Huang J. Analysis of quantization-based audio watermarking to D/A and A/D conversions. Int. J. Network Secur., 2006, 3, 230–238.
  • Xuan G, Zhu J, Chen J, Shi YQ, Ni Z, Su W. Distortionless data hiding based on integer wavelet transform. Electron. Lett., 2002, 38, 1646–1648.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.