A Lossy Compression Tolerant Data Hiding Method Based on JPEG and VQ
نویسندگان
چکیده
A lossy compression tolerant data hiding method is proposed in this paper. The image which hides data is named a stego-image. Most of data hiding methods will lose some hidden data when the stego-image is compressed by lossy compression process. However, there are few people will transmit image without lossy compression in the public internet. By the proposed method, the stego-image can be compressed by lossy compression method to reduce the image size. The receiver extracts complete data correctly from the lossy compressed image. Our hiding technique is based on the Vector Quantization (VQ) and the lossy compression technique of JPEG. The human visual system is difficult to detect there are unusual pixels in the stego-image. Because the proposed method is tolerant of lossy compression, it speeds up the transmission of stego-image and coincides with the transmitting image on the internet.
منابع مشابه
A Digital Watermarking Method Based on Classified
With the growing interest in copyright protection of multimedia, digital watermarking has been presented and widely researched. The digital image watermarking techniques are usually performed in spatial or transform domain. Most of transformdomain watermarking methods are based on Discrete Cosine Transforms (DCT) and robust to JPEG lossy compression. Recently, digital image watermarking based o...
متن کاملA Survey of Information Hiding Schemes for Digital Images
In this survey, we first describe the purposes for image hiding. They are Steganography, Image Watermarking and Image Authentication. Classified by hiding methods, image hiding can be divided into pixel-based image hiding, frequency-based image hiding and VQ-based image hiding. In the aspect of pixel-based image hiding, we describe three representative methods, the substitution table technique,...
متن کاملA Survey on Data Hiding and Compression Schemes
Data hiding has a vital role to play in information security. Using a data hiding technique, secret information is hidden into cover digital content. Compression techniques and data hiding techniques received much less attention from the research community and from industry than cryptography. In past research many data hiding and image compression techniques has been developed, it works indepen...
متن کاملA DCT-Based Secure JPEG Image Authentication Scheme
The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding ...
متن کاملA High Capacity Information Hiding Algorithm Based on Invariance Properties of JPEG Compression
Imperceptibility, robustness and hiding capacity are main indexes to measure information hiding algorithm. However, they always restrict each other. Invariance of JPEG compression has been analyzed at first. Then, according to invariance of JPEG compression, information hiding algorithm which can embed information in DCT median and high frequency coefficients has been proposed. Information embe...
متن کامل