36
Views
4
CrossRef citations to date
0
Altmetric
Original Article

An efficient reversible data hiding scheme based on SMVQ

, , &
Pages 467-474 | Accepted 09 Jul 2012, Published online: 18 Nov 2013

REFERENCES

  • Amin PK, Liu N, Subbalakshmi KP. Statistical attack resilient data hiding. Int. J. Network Secur., 2007, 5, 112–120.
  • Barton JM. ‘Method and apparatus for embedding authentication information within digital data’, US Patent 5 646997, 1997.
  • Chan CK, Cheng LM. Hiding data in images by simple LSB substitution. Pattern Recognit., 2004, 37, 469–474.
  • Chang CC, Kieu D, Chou YC. Reversible information hiding for VQ indices based on locally adaptive coding. J. Vis. Commun. Image Represent., 2009, 20, 57–64.
  • Chang CC, Tai WL, Lin CC. A reversible data hiding scheme based on side match vector quantization. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, 1301–1308.
  • Chang CC, Wu WC. A steganographic method for hiding secret data using side match vector quantization. IEICE Trans. Inf. Syst., 2005, E88-D, 2159–2167.
  • Chen TS, Chang CC, Hwang MS. A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process., 1998, 7, 1485–1488.
  • Chiou SF, Liao IE, Hwang MS. A capacity-enhanced reversible data hiding scheme based on SMVQ. Imag. Sci. J., 2011, 59, 17–24.
  • Feng JB, Lin IC, Tsai CS, Chu YP. Reversible watermarking: current status and key issues. Int. J. Network Secur., 2006, 2, 161–170.
  • Gray RM. Vector quantization. IEEE ASSP Mag., 1984, 4–29.
  • Hsiao JY, Chen JF, Chang JM. An adaptive reversible information hiding method based on search-order coding for VQ-compressed images. Imag. Sci. J., 2009, 57, 37–45.
  • Hwang MS, Chang CC, Hwang KF. Digital watermarking of images using neural networks. J. Electron. Imag., 2000, 9, 548–555.
  • Kim T. Side match and overlap match vector quantizers for images. IEEE Trans. Image Process., 1992, 1, 170–185.
  • Lee CF, Chen KN, Chang CC. A new data hiding strategy with restricted region protection. Imag. Sci. J., 2009, 57, 235–249.
  • Liao Z, Huang Y, Li C. Research on data hiding capacity. Int. J. Network Secur., 2007, 5, 140–144.
  • Linde Y, Buzo A, Gray RM. An algorithm for vector quantizer design. IEEE Trans. Commun., 1980, 28, 84–95.
  • Liu Y, Sun X, Cox IJ, Wang H. Natural language information hiding based on Chinese mathematical expression. Int. J. Network Secur., 2009, 8, 10–15.
  • Pennebaker WB, Mitchell JL. The JPEG Still Image Data Compression Standard, 1993 (Kluwer Academic Publishers, New York).
  • Taubman DS, Marcellin MW. JPEG2000: Image Compression Fundamentals Standards and Practice, 2002 (Kluwer Academic Publishers, Boston, MA).
  • Wang CM, Wu N, Tsai CS, Hwang MS. A high quality stegano-graphic method with pixel-value differencing and modulus function. J. Syst. Softw., 2008, 81, 150–158.
  • Wu HC, Wu NI, Tsai CS, Hwang MS. Image steganographic scheme based on pixel-value differencing and lsb replacement methods. IEE Proc. Vis. Image Signal Process., 2005, 152, 611–615.
  • Wu NI, Hwang MS. Data hiding: current status and key issues. Int. J. Network Secur., 2007, 4, 1–9.
  • Wu NI, Wang CM, Tsai CS, Hwang MS. A certificate-based water-marking scheme for coloured images. Image Sci. J., 2008, 56, 326–332.
  • Xinag S, Huang J. Analysis of quantization-based audio watermarking to D/A and A/D conversions. Int. J. Network Secur., 2006, 3, 230–238.
  • Xuan G, Zhu J, Chen J, Shi YQ, Ni Z, Su W. Distortionless data hiding based on integer wavelet transform. Electron. Lett., 2002, 38, 1646–1648.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.