ISSN ONLINE(2278-8875) PRINT (2320-3765)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Data Hiding Scheme For Side Match Vector Quantization and Arnold Decoding

Gumma Prasad1, V.Sathya Narayanan2
  1. M.Tech Student, Dept of Electronics & Communication Engineering, Seshachala Institute of Technology, Puttur, India1
  2. M.E, Asst. Professor, Dept of Electronics & Communication Engineering, Seshachala Institute of Technology, Puttur, India2
Related article at Pubmed, Scholar Google

 

Visit for more related articles at International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

Abstract

In any communication, security is the most important issue in today’s world. Security and data hiding algorithms have been developed, which worked as motivation for the research. This project is a data hiding by using side match vector quantization algorithm may used for data hiding scheme, which provides a strong backbone for its security. The scenario of present day of information security system includes privacy, genuineness, honesty, non-repudiation. This present work focus is hiding for data technique to secure data or message with authenticity and truthfulness. In this project work, the secret message is encrypted before the actual embedding process starts. The entire work has done in MATLAB. The hidden message is encrypted using a simple encryption algorithm using secret key for SMVQ and hence it will be almost unfeasible for the impostor to unhide the actual secret dispatch from the embedded cover file without knowing furtive key. Only receiver and sender know the secret key. SMVQ substitution technique is used as embedding and extraction method. We propose that this method could be most appropriate for hiding any secret message (text, image, audio, and video) in any standard cover media such as image, audio, video files.

Keywords

Data hiding, image compression, side match vector quantization, Arnold decoding

INTRODUCTION

The rapid expansion of Internet technology, people can transmit and share digital content with each other conveniently. In order to guarantee communication competence and save system bandwidth, compression techniques can be implemented on digital content to decrease redundancy, and the excellence of the decompressed versions should also be conserved. Nowadays, most digital content, especially digital images and videos are rehabilitated into the compressed forms for transmission [1-4]. Another imperative issue in an open network environment is how to send out secret or personal data steadily. Even though traditional cryptographic methods can encrypt the plaintext into the cipher text [5-6], the meaningless accidental data of the cipher text may also arouse the misgiving from the attacker. To solve this problem, in sequence hiding technique have been broadly urbanized in both academic world and industry, which can embed secret data into the cover data unnoticeably [7-8]. Due to the prevalence of digital images on the Internet, how to compress images and hide secret data into the dense images efficiently deserve in-depth study. Recently, many data-hiding scheme for the compressed codes have been reported, which can be applied to various density techniques of digital images, such as JPEG [9-10], JPEG2000 [11], and vector quantization (VQ) [12-15]. As one of the most accepted lossy data compression algorithms, VQ is widely used for digital image compression due to its simplicity and cost efficiency in implementation [16-17]. During the VQ compression process, the Euclidean distance is utilized to evaluate the similarity between each image block and the codeword in the codebook. The index of the codeword with the negligible distance is recorded to symbolize the chunk. Thus, an index table consisting of the index values for all the blocks is generate as the VQ firmness codes. Instead of pixel principles, only the index values are stored, consequently, the density is achieved effectively. The VQ decompression process can be implement easily and efficiently because only a simple table lookup operation is required for each received index. The proposed scheme in this paper is based on SMVQ. On the sender side, except for the blocks in the leftmost and uppermost of the image, each of the other residual blocks in raster-scanning order can be entrenched with secret data and packed in concomitantly by SMVQ. adaptively according to the current embedding bit. VQ is also utilized for some complex residual blocks to control the visual distortion and error diffusion caused by the progressive firmness. After receiving the compressed codes, the receiver can segment the packed in codes into a series of sections by the indicator bits.

JOINT DATA COMPRESSION SCHEME AND ARNOLD DECODING

In the proposed scheme, rather than two separate modules, only a single module is used to realize the two functions, i.e., image compression and secret data embedding, simultaneously. The image compression in mainly on the SMVQ mechanism. According to the secret bits for embedding, the image compression based on SMVQ. After receiving the secret embedded and compressed codes of the image, one can extract the embedded secret bits successfully during the image decompression..

A. Image enhancement

Image compression may be lossy or lossless. Lossless compression is preferred for archival purposes and often for medical imaging, technical drawings, clip art, or comics. Lossy compression methods, especially when used at low bit rates, introduce compression artifacts. Lossy methods are especially suitable for natural images such as photographs in applications where minor (sometimes imperceptible) loss of fidelity is acceptable to achieve a substantial reduction in bit rate. The lossy compression that produces imperceptible differences may be called visually lossless.

B. Data Embedding

Data hiding was introduced as part of the OOP methodology, in which a program is segregated into objects with specific data and functions. This technique enhances a programmer’s ability to create classes with unique data sets and functions, avoiding unnecessary penetration from other program classes. Because software architecture techniques rarely differ, there are few data hiding contradictions. Data hiding only hides class data components, whereas data encapsulation hides class data parts and private methods.Information hiding for programmers is executed to prevent system design change. If design decisions are hidden, certain program code cannot be modified or changed. Information hiding is usually done for internally changeable code, which is sometimes especially designed not to be exposed. Such stored and derived data is not expounded upon, most generally. Change resilience of classes and ease of use by client objects are two byproducts of hidden data.
To behavior the decompression and secret bit extraction of each remaining block, the compressed codes are segmented into a series of section adaptively according to the indicator bits. Explicitly, if the current indicator bit in the packed in codes is 0, this indicator bit and the following log2 W bits are segmented as a piece, which means this section corresponds to a VQ compressed block with no embedded secret bit. The decimal value of the last log2 W bits in this section is exactly the VQ index that can be used directly to recover the block. Otherwise, if the current indicator bit is 1, this indicator bit and the subsequent log2 (R + 1) bits are then segmented as a section, which means this section corresponds to an SMVQ or inpainting compressed block. Denote the decimal value of the last log2 (R + 1) bits in this section as λ’. Under this condition, if λ’ is equal to R, it implies that the residual block parallel to this section was compressed by inpainting and that the embedded secret bit in this block is 1. Otherwise, if λ’ ∈ [0, R − 1], it imply that the block matching to this section was compressed by SMVQ and that the entrenched secret bit is 0. After all the segmented sections in the packed in codes complete the above describe procedure, the embedded secret bits can be extracted correctly, and the decompressed image Id can be obtain successfully. Due to the decoding of the compressed codes, the decompressed picture Id doesn’t surround the embedded secret bits any longer. Note that the process of secret bit extraction can also be conducted separately, the data embedding technique may be used for many algorithms one of the best technique is side match vector quantization technique which means that the receiver can obtain all embedded bits by simply segmenting and analyzing the compressed codes without the decoding. the receiver can obtain the secret bits at any moment if he or she conserve the compressed codes. The proposed scheme can also be used for the integrity corroboration of the images, in which the secret bits for embedding can be regarded as the hash of the image attitude contents. The receiver can calculate the hash of the principle contents for the decompressed picture, and then compare this calculated hash with the extracted secret bits (embedded hash) to judge the integrity of the received compressed codes and the corresponding decompressed image. If the two hashes are equal, it earnings the image is genuine. Otherwise, the received compressed codes must be tampered.

EXPERIMENTAL RESULTS AND ANALYSIS

Experiments were conducted on a group of gray-level images to verify the effectiveness of the proposed scheme. In the experiment, the sizes of the divided non-overlapping image blocks were 4 × 4, i.e., n = 4. Accordingly, the length of each codeword in the used VQ codebooks was 16. The parameter R was set to 15. Six standard, 512 × 512 and 256 × 256 test images, i.e., Lena, Airplane, Lake, Peppers, Sailboat, and Tiffany,The luminance components of the color images in this database were xtracted and used in the experiments. The performance of compression ratio, decompression quality, and beating capacity for the proposed scheme were evaluated.
Because the threshold T used in the procedure of image density and secret data embedding is closely related to the compression method for each residual block and also influences on the performance of the proposed scheme, the testing for unlike values of T was first conducted in the compression and secret embedding procedure. Figures 4 and 5 show the labeling results of image blocks with different compression method, in which the black block, gray block, and white block correspond to the blocks compressed by VQ, SMVQ, and image inpainting, respectively. The VQ codebook size W used in Figures 54and 5 was 256, and secret bits for embedding were generated by (PRNG). Note that the blocks in the topmost row and the leftmost column must be black, i.e., compressed by VQ. It can be obviously found that the number of SMVQ blocks and blocks increase with T, while the number of VQ blocks decreases. As describe in Section 2, the blocks compressed by VQ are not used for secret bit embed, and the secret bits are only entrenched in the SMVQ and Arnold decoding. Thus, the hiding capacity of the proposed scheme is equal to the sum of the numbers of SMVQ Figures 4(a)-(d) show the relationships between hiding capacity and threshold T for the six test images in Figure 4 with codebook sizes W = 128, 256, 512, and 1024, respectively. We can observe that, with the same codebook, the hiding capacity increases with the threshold T. It can also be seen from Figure 7 that, under the same threshold T, the hiding capacity also increases with the codebook size W. We compare the hiding capacity of the proposed scheme with three typical schemes [31-33].
i.e., Tsai et al.’s scheme [31] and Qian et al.’s scheme [32], and is comparable to the scheme in [33] that embedded secret information by histogram shifting in the uncompressed domain. The assessment results also demonstrate that the image compressed codes based on SMVQ can be used to carry more secret bits than the JPEG packed together codes.
image
The above equation may be consisting for to calculate the peak signal to noise ratio.
The PSNR values are improved for depending upon previous technique for data hiding. And data hiding for improved algorithm is Arnold coding may applied for to improve the PSNR results. Luminance and contrast synthetically for the image quality assessment [20].with the increase of T, more blocks are processed by SMVQ & ARNOLD.
Therefore, the compression ratio CR increases accordingly, and the decompression quality also becomes better because image inpainting has superior recovery capability for smooth blocks compared with VQ. The side matches vector quantization technique and Arnold decoding technique may use for data hiding for proposed method. The proposed method by using data embedded for secrets data for data transmission for channel. In data transfer channel may used is a process in which the characristics of a carrier wave is varied in accordance with the instantaneous values of a modulated data.

CONCLUSIONS

In this paper, we proposed a joint data-hiding and compression scheme by using SMVQ and PDE-based image Arnold decoding. The blocks, except for those in the leftmost and topmost of the image, can be embedded with covert data and packed in at the same time, and the adopted compression method switches between SMVQ and SVD adaptively according to the embed bits. SVD (singular value decomposition) is also utilized for some complex blocks to control the visual distortion and error dissemination. The SVD method may be used for better results coming to existing system. On the recipient side, after segmenting the packed in codes into a series of sections by the indicator bits, the embedded secret bits can be easily extract according to the index values in the segmented sections, and the decompression for all blocks can also be achieved productively by VQ, SMVQ, and Arnold coding. The experimental results show that our scheme has the acceptable performance for hiding capacity, compression ratio, and decompression quality. Furthermore, the proposed scheme can integrate the two functions of data hiding and image compression into a single module seamlessly. In feature work would be better results coming to receiver and transmitter part.

Tables at a glance

Table icon
Table 1
 

Figures at a glance

Figure 1 Figure 2 Figure 3 Figure 4 Figure 5
Figure 1 Figure 2 Figure 3 Figure 4 Figure 5
 

References

  1. W. B. Pennebaker and J. L. Mitchell, The JPEG Still Image Data Compression Standard. New York: Reinhold, 1993.
  2. D. S. Taubman and M.EG2000: Image Compression Fundamentals Standards and Practice. Norwell, MA: Kluwer, 2002.
  3. A. Gersho and R. M. Gray, Vector Quantization and Signal Compression. 1992.
  4. N. M. Nasrabadi and R. King, “Image Coding Using Vector Quantization: A Review,” IEEE Transactions on Communications, pp. 957-971, 1988.
  5. National Institute of Standards & Technology, “Announcing the Advanced Encryption Standard (AES),” Federal
  6. R. L. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,”
  7. F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information Hiding — A Survey,” 87, no. 7, pp., 1999.
  8. C. D. Vleeschouwer, J. F. Delaigle and B Macq, “Invisibility and Application Functionalities in Perceptual atermarking:
  9. C. C. Chang, T. S. Chen and L. Z. Chung, “A Steganographic Method Based Sciences, vol. 141, no. 1, pp. 123-138, 2002.
  10. H. W. Tseng and C. C. Chang, “High Capacity Data Hiding in JPEG-Compressed Images,”., 2004.
  11. P. C. Su and C. C. Kuo, “Steganography in JPEG2000 Compressed Images4, pp. 824-832, 2003.
  12. W. J. Wang, C. T. Huang and S. J. Wang, “VQ Applications in Steganographic Data Hiding Upon Multimedia Images,” IEEE 5, no. 4, pp. 528-537, 2011.
  13. Y. C. Hu, “High-Capacity Image Hiding Scheme Based on Vector Quantization,” Pattern Recognition, vol. 39, no. 9, pp., 2006.
  14. Y. P. Hsieh, C. C. Chang and L. J. Liu, “A Two-Codebook Combination and Three-Phase Block Matching Based Image-Hiding Scheme with High Embedding Capacity,” Pattern Recognition, vol. 41,no. 10, pp. 3104-3113,
  15. C. H. Yang and, “Fractal Curves to Improve the Reversible Data Embedding for VQ-Indexes Based on Locally Adaptive Coding,” and Image Representation, vol. 21, no. 4, pp-342, 2010.
  16. Y. Linde, A. Buzo and R. M. Gray, “An Algorithm for Vector Quantization Design,” IEEE Transactions on Communications, vol., 1980.
  17. C. C. Chang and W. C. Wu, “Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook,” IEEE 2007.
  18. W. C. Du and W. J. Hsu, “Adaptive Data Hiding Based on VQ Compressed Images,” IEE Proceedings - Vision, Image and Signal, no. 4, pp. 233- 238, 2003.
  19. C. C. Chang, “Hiding Secret Data Adaptively in Vector Quantisation Index Tables
  20. C. C. Lin, S. C. Chen and N. L. Hsueh, “Adaptive Embedding Techniques for VQ-Compressed Images,” Information Sciences, vol. 179, no. 3, pp. 140-149, 2009.
  21. C. H. C. Tsai, “Lossless Compression of VQ Index with Search-Order Coding,” IEEE Transactions on Image Processing, vol. 5, no. 11, pp. 1579- 1582, 1996.
  22. C. C. Lee, W. H. Ku and S. Y. Huang, “A New Steganographic Scheme Based on Vector Quantisation and Search-Order Coding,” IET Image Processing, vol. 3, no. 4, pp, 2009.
  23. S. C. Shie and S. D. Lin, “Data Hiding Based on Compressed VQ Indices of Images,” Computer Standards Interfaces, vol. 31, no. 6, pp. 1143-1149, 2009.
  24. C. C. Chang, G. M. Chen and M. H. Lin, “Information Hiding Based on Search-Order Coding for VQ Indices,” Pattern 25, no. 11, pp. 1253-1261, 2004.
  25. T. Kim, “Side Match and Overlap Match Vector Quantizers for Images,” IEEE Transactions on Image Processing, vol. 1, no. 4, , 1992.
  26. C. C. Chang, W. L. Tai and C. C. Lin, “A Reversible Data Hiding Scheme Based on Side Match Vector Quantization,” IEEE Transactions on Circuits and Systems for Video Technology. 10, pp. 1301-1308, 2006.
  27. C. C. Chen and C. C. Chang, “High Capacity SMVQ-Based Hiding Scheme Using Adaptive Index,” Signal Processing,
  28. L. S. Chen and J. C. Lin, “Steganography Scheme Based on Side Match Vector Quantization,” Optical Engineering, vol. 49, no. 3, pp.