Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A New Steganography Scheme in the Domain of Side-Match Vector Quantization

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3683))

  • 1321 Accesses

Abstract

This article reports a pioneer work on a steganography scheme in the domain of side-match vector quantization. The challenge associated with dynamic state code books had been resolved by two possible alternatives, namely code book partition by code words’ mean and code book partition by pseudo random sequence. Experiment results reveal that imperceptibility required for secret communication can be ensured with the proposed approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Pan, J.-S., Huang, H.-C., Jain, L.C. (eds.): Intelligent Watermarking Techniques. World Scientific Publishing Company, Singapore (2004)

    MATH  Google Scholar 

  2. Katzenbeisser, S., Petitcolas, F.A.P. (eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers (2000)

    Google Scholar 

  3. Cole, E.: Hiding in Plain Sight: Steganography and the Art of Covert Communication. Wiley, Chichester (2003)

    Google Scholar 

  4. Stallings, W.: Cryptography and Network Security: Principles and Practice, 3rd edn. Prentice-Hall, Englewood Cliffs (2002)

    Google Scholar 

  5. SearchSecurity.com at http://searchsecurity.techtarget.com

  6. Sayood, K.: Introduction to Data Compression, 2nd edn. Morgan Kaufmann, San Francisco (2000)

    Google Scholar 

  7. Gray, R.M.: Vector quantization. IEEE ASSP Magazine, 4–29 (1984)

    Google Scholar 

  8. Chang, R.-F., Chen, W.-T.: Image coding using variable-rate side-match finite-state vector quantization. IEEE Transactions on Image Processing 2(1), 104–108 (1993)

    Article  MathSciNet  Google Scholar 

  9. Lu, Z.M., Sun, S.H.: Digital image watermarking technique based on vector quantization. IEE Electronics Online 36(4), 303–305 (2000)

    Google Scholar 

  10. BletchleyPark.net, Cryptograph, at http://www.bletchleypark.net/cryptology

  11. Goldberg, D.E.: Genetic Algorithms in Search Optimization and Machine Learning. Addison Wesley, Reading (1989)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shieh, CS., Chang, CC., Chu, SC., Chang, JF. (2005). A New Steganography Scheme in the Domain of Side-Match Vector Quantization. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_145

Download citation

  • DOI: https://doi.org/10.1007/11553939_145

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28896-1

  • Online ISBN: 978-3-540-31990-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics