Skip to main content
Erschienen in: The Journal of Supercomputing 9/2018

20.09.2016

VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements

verfasst von: Cheng-Ta Huang, Min-Yi Tsai, Li-Chiun Lin, Wei-Jen Wang, Shiuh-Jeng Wang

Erschienen in: The Journal of Supercomputing | Ausgabe 9/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of things (IoT) realizes the concept of bringing things connected together. Data are exchanged and controlled within one or more IoT networks. Sensitive data transferred between different IoT networks may also lead to data leakage. One way to reduce the risk of these problems is to employ steganography while delivering secret information over the IoT networks. This paper presents a steganographic scheme that employs vector quantization (VQ) transformation and the least significant bits (LSB) to embed secret data into a cover image. We devise a new technique, namely two-level encoding, to separate the pixels of a \(4\times 4\) VQ-transformed image block into two groups, the LSB group and the secret data group, in the first level. Then we use an indirect approach that embeds VQ indexes in the LSB group and secret data in the secret data group in the second level. The embedded VQ indexes are used to represent the VQ-transformed image blocks, and the secret data are used as the difference values to adjust the VQ-transformed image blocks and to create stego-image blocks, such that the stego-image blocks become more similar to the original image blocks after embedding. Compared with other similar work, the experimental results show that the proposed scheme produces stego-images with slightly better quality in terms of PSNR; the experimental results also indicate that it provides about ten times as large as the embedding capacity of the prior similar schemes. Moreover, the proposed scheme is able to pass the popular detections, such as Chi-square test and AUMP LSB, both to detect whether an image uses LSB for data hiding.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yang CH, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3(3):488–497CrossRef Yang CH, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3(3):488–497CrossRef
2.
Zurück zum Zitat Yang CH, Weng CY, Wang SJ, Sun HM (2010) Varied PVD + LSB evading detection programs to spatial domain in data embedding systems. J Syst Softw 83(10):1635–1643CrossRef Yang CH, Weng CY, Wang SJ, Sun HM (2010) Varied PVD + LSB evading detection programs to spatial domain in data embedding systems. J Syst Softw 83(10):1635–1643CrossRef
3.
Zurück zum Zitat Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214CrossRef Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214CrossRef
4.
Zurück zum Zitat Liao X, Wen QY, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent 22(1):1–8CrossRef Liao X, Wen QY, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent 22(1):1–8CrossRef
5.
Zurück zum Zitat Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circuits Syst Video Technol 16(10):1301–1308CrossRef Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circuits Syst Video Technol 16(10):1301–1308CrossRef
6.
Zurück zum Zitat Chen LS, Lin JC (2010) Steganography scheme based on side match vector quantization. Opt Eng 49(3):0370081–0370087CrossRef Chen LS, Lin JC (2010) Steganography scheme based on side match vector quantization. Opt Eng 49(3):0370081–0370087CrossRef
7.
Zurück zum Zitat Huang CT, Wang WJ, Yang CH, Wang SJ (2013) A scheme of reversible information hiding based on SMVQ. Imaging Sci J 61(2):195–203CrossRef Huang CT, Wang WJ, Yang CH, Wang SJ (2013) A scheme of reversible information hiding based on SMVQ. Imaging Sci J 61(2):195–203CrossRef
8.
Zurück zum Zitat Wang ZH, Chang CC, Chen KN, Li MC (2010) An encoding method for both image compression and data lossless information hiding. J Syst Softw 83(11):2073–2082CrossRef Wang ZH, Chang CC, Chen KN, Li MC (2010) An encoding method for both image compression and data lossless information hiding. J Syst Softw 83(11):2073–2082CrossRef
9.
Zurück zum Zitat Yang CH, Wang WJ, Huang CT, Wang SJ (2011) Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf Sci 181(11):2218–2230CrossRef Yang CH, Wang WJ, Huang CT, Wang SJ (2011) Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf Sci 181(11):2218–2230CrossRef
10.
Zurück zum Zitat Shen JJ, Ren JM (2010) A robust associative watermarking technique based on vector quantization. Digit Signal Process 20(5):1408–1423CrossRef Shen JJ, Ren JM (2010) A robust associative watermarking technique based on vector quantization. Digit Signal Process 20(5):1408–1423CrossRef
11.
Zurück zum Zitat Lu ZM, Wang JX, Liu BB (2009) An improved lossless data hiding scheme based on image VQ-index residual value coding. J Syst Softw 82(6):1016–1024CrossRef Lu ZM, Wang JX, Liu BB (2009) An improved lossless data hiding scheme based on image VQ-index residual value coding. J Syst Softw 82(6):1016–1024CrossRef
12.
Zurück zum Zitat Lin CC, Chen SC, Hsueh NL (2009) Adaptive embedding techniques for VQ-compressed images. Inf Sci 179(1–2):140–149CrossRef Lin CC, Chen SC, Hsueh NL (2009) Adaptive embedding techniques for VQ-compressed images. Inf Sci 179(1–2):140–149CrossRef
13.
Zurück zum Zitat Wang JX, Lu ZM (2009) A path optional lossless data hiding scheme based on VQ joint neighboring coding. Inf Sci 179(19):3332–3348CrossRef Wang JX, Lu ZM (2009) A path optional lossless data hiding scheme based on VQ joint neighboring coding. Inf Sci 179(19):3332–3348CrossRef
14.
Zurück zum Zitat Lee CC, Ku WH, Huang SY (2009) A new steganographic scheme based on vector quantisation and search-order coding. IET Image Process 3(4):243–248CrossRef Lee CC, Ku WH, Huang SY (2009) A new steganographic scheme based on vector quantisation and search-order coding. IET Image Process 3(4):243–248CrossRef
15.
Zurück zum Zitat Chen WJ, Huang WT (2009) VQ indexes compression and information hiding using hybrid lossless index coding. Digit Signal Process 19(3):433–443CrossRef Chen WJ, Huang WT (2009) VQ indexes compression and information hiding using hybrid lossless index coding. Digit Signal Process 19(3):433–443CrossRef
16.
Zurück zum Zitat Lee CF, Chen HL, Lai SH (2010) An adaptive data hiding scheme with high embedding capacity and visual image quality based on SMVQ prediction through classification codebooks. Image Vis Comput 28(8):1293–1302CrossRef Lee CF, Chen HL, Lai SH (2010) An adaptive data hiding scheme with high embedding capacity and visual image quality based on SMVQ prediction through classification codebooks. Image Vis Comput 28(8):1293–1302CrossRef
17.
Zurück zum Zitat Lee Y, Kim H, Park Y (2009) A new data hiding scheme for binary image authentication with small image distortion. Inf Sci 179(22):3866–3884CrossRef Lee Y, Kim H, Park Y (2009) A new data hiding scheme for binary image authentication with small image distortion. Inf Sci 179(22):3866–3884CrossRef
18.
Zurück zum Zitat Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit Signal Process 20(6):1597–1611CrossRef Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit Signal Process 20(6):1597–1611CrossRef
19.
Zurück zum Zitat Phan RCW (2008) Tampering with a watermarking-based image authentication scheme. Pattern Recognit 41(11):3493–3496CrossRefMATH Phan RCW (2008) Tampering with a watermarking-based image authentication scheme. Pattern Recognit 41(11):3493–3496CrossRefMATH
20.
Zurück zum Zitat Rawat S, Raman B (2012) Best tree wavelet packet transform based copyright protection scheme for digital images. Opt Commun 285(10–11):2563–2574CrossRef Rawat S, Raman B (2012) Best tree wavelet packet transform based copyright protection scheme for digital images. Opt Commun 285(10–11):2563–2574CrossRef
21.
Zurück zum Zitat Run RS, Horng SJ, Lai JL, Kao TW, Chen RJ (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689CrossRef Run RS, Horng SJ, Lai JL, Kao TW, Chen RJ (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689CrossRef
22.
Zurück zum Zitat Westfeld A, Pfitzmann A (2000) Attacks on steganographic systems. In: Proceedings of the Third International Workshop on Information Hiding, London, pp 61–76 Westfeld A, Pfitzmann A (2000) Attacks on steganographic systems. In: Proceedings of the Third International Workshop on Information Hiding, London, pp 61–76
23.
Zurück zum Zitat Lou DC, Chou CL, Tso HK, Chiu CC (2012) Active steganalysis for histogram-shifting based reversible data hiding. Opt Commun 285(10–11):2510–2518CrossRef Lou DC, Chou CL, Tso HK, Chiu CC (2012) Active steganalysis for histogram-shifting based reversible data hiding. Opt Commun 285(10–11):2510–2518CrossRef
24.
Zurück zum Zitat Fillatre L (2012) Adaptive steganalysis of least significant bit replacement in grayscale natural images. IEEE Trans Signal Process 60(2):556–569MathSciNetCrossRefMATH Fillatre L (2012) Adaptive steganalysis of least significant bit replacement in grayscale natural images. IEEE Trans Signal Process 60(2):556–569MathSciNetCrossRefMATH
26.
Zurück zum Zitat Linde Y, Buzo A, Gray R (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28(1):84–95CrossRef Linde Y, Buzo A, Gray R (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28(1):84–95CrossRef
Metadaten
Titel
VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements
verfasst von
Cheng-Ta Huang
Min-Yi Tsai
Li-Chiun Lin
Wei-Jen Wang
Shiuh-Jeng Wang
Publikationsdatum
20.09.2016
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 9/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-016-1874-9

Weitere Artikel der Ausgabe 9/2018

The Journal of Supercomputing 9/2018 Zur Ausgabe

Premium Partner