The general hiding strategy is to embed the confidential image such as a weaponry plan, called secret image in this paper, into an in-confidential image. However, we have found that sometimes people also transmit the compression codes generated by a compression technique, such as VQ or BTC, via the Internet in order to save the transmission time. The key point of this paper is to embed the secret image into the compression codes generated by the BTC algorithm, such as means and the bitmap of each block. The experimental results have confirmed that the proposed approach would indeed allow legal receivers to retrieve the secret images without distorting them. Although the original means and bitmaps are modified in order to hide the secret images, the difference between the PSNRs generated by original BTC and our scheme is insignificant.
[1]
Adi Shamir,et al.
A method for obtaining digital signatures and public-key cryptosystems
,
1978,
CACM.
[2]
Daniel Augot,et al.
Secure delivery of images over open networks
,
1999
.
[3]
Chin-Chen Chang,et al.
A Fast and Secure Image Hiding Scheme Based on LSB Substitution
,
2002,
Int. J. Pattern Recognit. Artif. Intell..
[4]
C. F. Osborne,et al.
A digital watermark
,
1994,
Proceedings of 1st International Conference on Image Processing.
[5]
Chin-Chen Chang,et al.
Both Color and Gray Scale Secret Images Hiding in a Color Image
,
2002,
Int. J. Pattern Recognit. Artif. Intell..
[6]
Ja-Chen Lin,et al.
Image hiding by optimal LSB substitution and genetic algorithm
,
2001,
Pattern Recognit..