VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements

Internet of things (IoT) realizes the concept of bringing things connected together. Data are exchanged and controlled within one or more IoT networks. Sensitive data transferred between different IoT networks may also lead to data leakage. One way to reduce the risk of these problems is to employ steganography while delivering secret information over the IoT networks. This paper presents a steganographic scheme that employs vector quantization (VQ) transformation and the least significant bits (LSB) to embed secret data into a cover image. We devise a new technique, namely two-level encoding, to separate the pixels of a $$4\times 4$$4×4 VQ-transformed image block into two groups, the LSB group and the secret data group, in the first level. Then we use an indirect approach that embeds VQ indexes in the LSB group and secret data in the secret data group in the second level. The embedded VQ indexes are used to represent the VQ-transformed image blocks, and the secret data are used as the difference values to adjust the VQ-transformed image blocks and to create stego-image blocks, such that the stego-image blocks become more similar to the original image blocks after embedding. Compared with other similar work, the experimental results show that the proposed scheme produces stego-images with slightly better quality in terms of PSNR; the experimental results also indicate that it provides about ten times as large as the embedding capacity of the prior similar schemes. Moreover, the proposed scheme is able to pass the popular detections, such as Chi-square test and AUMP LSB, both to detect whether an image uses LSB for data hiding.

[1]  Zhe-Ming Lu,et al.  An improved lossless data hiding scheme based on image VQ-index residual value coding , 2009, J. Syst. Softw..

[2]  Cheng-Hsing Yang,et al.  Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[3]  Chin-Chen Chang,et al.  An encoding method for both image compression and data lossless information hiding , 2010, J. Syst. Softw..

[4]  Nien-Lin Hsueh,et al.  Adaptive embedding techniques for VQ-compressed images , 2009, Inf. Sci..

[5]  Ja-Chen Lin,et al.  Steganography scheme based on side match vector quantization , 2010 .

[6]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[7]  Der-Chyuan Lou,et al.  Active steganalysis for histogram-shifting based reversible data hiding , 2012 .

[8]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[9]  Robert M. Gray,et al.  An Algorithm for Vector Quantizer Design , 1980, IEEE Trans. Commun..

[10]  Cheng-Hsing Yang,et al.  Varied PVD + LSB evading detection programs to spatial domain in data embedding systems , 2010, J. Syst. Softw..

[11]  Balasubramanian Raman,et al.  Best tree wavelet packet transform based copyright protection scheme for digital images , 2012 .

[12]  Wen-Tsung Huang,et al.  VQ indexes compression and information hiding using hybrid lossless index coding , 2009, Digit. Signal Process..

[13]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[14]  Raphael C.-W. Phan,et al.  Tampering with a watermarking-based image authentication scheme , 2008, Pattern Recognit..

[15]  Cheng-Chi Lee,et al.  A new steganographic scheme based on vector quantisation and search-order coding , 2009, IET Image Process..

[16]  Zhe-Ming Lu,et al.  A path optional lossless data hiding scheme based on VQ joint neighboring coding , 2009, Inf. Sci..

[17]  Younho Lee,et al.  A new data hiding scheme for binary image authentication with small image distortion , 2009, Inf. Sci..

[18]  Jagdish Chandra Patra,et al.  A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression , 2010, Digit. Signal Process..

[19]  Chin-Chen Chang,et al.  A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  Qiaoyan Wen,et al.  A steganographic method for digital images with four-pixel differencing and modified LSB substitution , 2011, J. Vis. Commun. Image Represent..

[21]  C.-T. Huang,et al.  A scheme of reversible information hiding based on SMVQ , 2013 .

[22]  Lionel Fillatre Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images , 2012, IEEE Transactions on Signal Processing.

[23]  Jau-Ji Shen,et al.  Digital Signal Processing , 2022 .

[24]  Chin-Feng Lee,et al.  An adaptive data hiding scheme with high embedding capacity and visual image quality based on SMVQ prediction through classification codebooks , 2010, Image Vis. Comput..

[25]  Shi-Jinn Horng,et al.  An improved SVD-based watermarking technique for copyright protection , 2012, Expert Syst. Appl..