219
Views
15
CrossRef citations to date
0
Altmetric
Original Article

A scheme of reversible information hiding based on SMVQ

, , &
Pages 195-203 | Accepted 22 Jun 2011, Published online: 12 Nov 2013

REFERENCES

  • Shie SC, Lin SD, Jiang JH. Visually imperceptible image hiding scheme based on vector quantization. Inf. Process. Manage., 2010, 46, 495–501.
  • Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur., 2010, 5, 201–214.
  • Bulan O, Sharma G, Monga V. Orientation modulation for data hiding in clustered-dot halftone prints. IEEE Trans. Image Process., 2010, 19, 2070–2084.
  • Hu Y, Lee HK, Li J. DE-based reversible data hiding with improved overflow location map. IEEE Trans. Circuits Syst. Video Technol., 2009, 19, 250–260.
  • Zhang L, Wang H, Wu R. A high-capacity steganography scheme for JPEG2000 baseline system. IEEE Trans. Image Process., 2009, 18, 1797–1803.
  • Lou DC, Wu NI, Wang CM, Lin ZH, Tsai CS. A novel adaptive steganography based on local complexity and human vision sensitivity. J. Syst. Software, 2010, 83, 1236–1248.
  • Fridrich J, Goljan M, Du R. Lossless data embedding – new paradigm in digital watermarking. EURASIP J. Adv. Signal Process., 2002, 2002, 185–196.
  • Tian J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol., 2003, 13, 890–896.
  • Alattar AM. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process., 2004, 13, 1147–1156.
  • Hong W, Chen TS. A local variance-controlled reversible data hiding method using prediction and histogram-shifting. J. Syst. Software, 2010, 83, 2653–2663.
  • Luo H, Yu FX, Chen H, Huang ZL, Li H, Wang PH. Reversible data hiding based on block median preservation. Inf. Sci., 2011, 181, 308–328.
  • Chen CC, Chang CC. High capacity SMVQ-based hiding scheme using adaptive index. Signal Process., 2010, 90, 2141–2149.
  • Chang CC, Tai WL, Lin CC. A reversible data hiding scheme based on side match vector quantization. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, 1301–1308.
  • Chen LS, Lin JC. Steganography scheme based on side match vector quantization. Opt. Eng., 2010, 49, 0370081–0370087.
  • Yang CH, Wang WJ, Huang CT, Wang SJ. Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf. Sci., 2011, 181, 2218–2230.
  • Wu MN, Chang CC. A novel high capacity reversible information hiding scheme based on side-match prediction and shortest spanning path, Circuits Syst. Signal Process., 2008, 27, 137–153.
  • Yang CH, Lin YC. Reversible data hiding of a VQ index table based on referred counts. J. Visual Commun. Image Represent., 2009, 20, 399–407.
  • Wang JX, Lu ZM. A path optional lossless data hiding scheme based on VQ joint neighboring coding. Inf. Sci., 2009, 179, 3332–3348.
  • Lu ZM, Wang JX, Liu BB. An improved lossless data hiding scheme based on image VQ-index residual value coding. J. Syst. Software, 2009, 82, 1016–1024.
  • Chen WJ, Huang WT. VQ indexes compression and information hiding using hybrid lossless index coding. Digital Signal Process., 2009, 19, 433–443.
  • Yang CH, Lin YC. Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding. J. Visual Commun. Image Represent., 2010, 21, 334–342.
  • Yang CH, Wu SC, Huang SC, Lin YK. Huffman-code strategies to improve MFCVQ-based reversible data hiding for VQ indexes. J. Syst. Software, 2011, 84, 388–396.
  • Linde Y, Buzo A, Gray R. An algorithm for vector quantizer design. IEEE Trans. Commun., 1980, 28, 84–95.
  • Kim T. Side match and overlap match vector quantizers for images. IEEE Trans. Image Process., 1992, 1, 170–185.
  • Papadimitriou CH, Steiglitz K. Combinatorial Optimization: Algorithms and Complexity, 1982, pp. 251–252 (Prentice-Hall, Inc., Upper Saddle River, NJ).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.