Document Type : Research Paper

Authors

Mosul University - College of Computer Science and Mathematics

10.37652/juaps.2012.63372

Abstract

present research was aimed to implement a new Steganographic algorithm for colored images in Vector Quantization (VQ) compressed domain, since the compressed image considers a secure cover for data to be embedded to avoid attention of unauthorized persons. Also, it saves the cost and time of transmission and storage. The new algorithm aimed to increase the embedding capacity with maintaining the image quality as well as reducing the time of the extraction process. The algorithm was implemented using Matlab 2009a. It embedded two bits in each index depending on mod 4, and secret key shared between sender and receiver. The algorithm used grayscale and RGB images for (JPG) of different resolutions after compression in order to be used as a cover of secret data which were either as text or image. In the research, the new algorithm provided an acceptable image quality despite of the high embedding capacity that occupy the cover image completely, Also, the codebook was not needed for data extraction which led to reducing the extraction time significantly

Keywords

Main Subjects

[1]   Wang Z. H., Chen K. N., Chang C. C., and Li M. C., (2009). "Hiding Information in VQ Index Tables with Reversibility". Proceedings of the International Symposium on Intelligent Information Systems and Applications, China.
[2]   Motameni H., Norouzi M., Jahandar M., and Hatami A., (2007). "Labeling Method in Steganography". World Acad. Sci. Eng. Technol., Issue 30, pp. 349-354.
[3]  
Amin F., Soleimanipour M., and Karimi A., (2008). "A Novel Plausible Deniability Scheme in Secure Steganography". World Academy of Science, Engineering and Technology, Vol. 43, pp.217-219.
[4]   Hovancak R., Foris P., & Levicky D., (2006). "Steganography Based on DWT Transform". In: Radioelektronika 16th international Czech - Slovak scientific conference: Conference Proceedings. Bratislava. Slovak University of Technology, Czech.
[5]   Katzenbeisser S. C., and Petitcolas F. A. P., (2000). "Information hiding techniques for steganography and Digital Watermarking". Artech House, Bosten, London.
[6]   Potdar V., and Chang E., (2004). "Visibly Invisible: Ciphertext as a Steganographic Carrier". 4th International Network Conference, Plymouth U.K.
[7]   Du W. C. and Hsu W. J., (2003). "Adaptive Data Hiding Based on VQ Compressed Images". IEEE Proc.-Vis. Image Signal Process., Vol. 150, No. 4, pp. 233-238.
[8]   Chang C.C., & Lin P.Y., (2004)."A Compression-Based Data Hiding Scheme Using Vector Quantization and Principal Component Analysis". International Conference on Cyberworlds, Tokyo, Japan.
[9]   Chang C. C., and Lu T. C., (2006). "Reversible Index-Domain Information Hiding Scheme Based on Side-Match Vector Quantization". The Journal of Systems and Software,  Vol. 79, Issue 8. pp.1120–1129.
[10]         Shie C. S., Lin S. D., and Fang C. M.,(2006)."Adaptive Data Hiding Based on SMVQ Prediction". IEICE Trans. Inf. & Syst., Vol. 89, No.1, pp.358-362.
[11]         Lin C. C., Chen S. C., and Hsueh N. L.,(2009). "Adaptive Embedding Techniques for VQ-Compressed Images". Information Sciences, Vol. 179, Issues 1-2, pp.140–149 .
[12]         Chang C. C., Lin P. Y., and Wang H. C., (2009). "Distortion-Free Steganography Mechanism with Compression to VQ Indices". International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 2, No. 2, pp. 39-52.
[13]         Lin C. Y., and Chang C. C., (2006). "Hiding Data in VQ-Compressed Images Using Dissimilar Pairs". Journal of Computers, Vol.17, No.2, pp.3-10.
[14]         Saffar H. E., (2008). "Channel Optimized VQ: Iterative Design Algorithms". MSc Thesis, Dept of Mathematics & Statistics, Queen’s University, Kingston, Canada.