An Improved Reversible Data-Hiding Scheme for LZW Codes

Similar documents
A Reversible Data Hiding Scheme for BTC- Compressed Images

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

A reversible data hiding based on adaptive prediction technique and histogram shifting

A Robust Watermarking Algorithm For JPEG Images

REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION.

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Data Hiding on Text Using Big-5 Code

Enhancing the Image Compression Rate Using Steganography

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

Digital image steganography using LSB substitution, PVD, and EMD

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

A Novel Reversible Data Hiding Technique Based on Pixel Prediction and Histogram Shifting

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

Data Hiding in Color Images Using Modified Quantization Table

Interleaving Max-Min Difference Histogram Shifting Data Hiding Method

SSIM based image quality assessment for vector quantization based lossy image compression using LZW coding

A Framework to Reversible Data Hiding Using Histogram-Modification

Image Compression Algorithm and JPEG Standard

Image Steganography Method Using Integer Wavelet Transform

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

A Grayscale Image Steganography Based upon Discrete Cosine Transformation

Implementation and Optimization of LZW Compression Algorithm Based on Bridge Vibration Data

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Reversible Contrast Enhancement

A New Reversible Watermarking Method. Based on Histogram Shifting

Reversible Data Hiding Based on Median Difference Histogram

Image compression. Stefano Ferrari. Università degli Studi di Milano Methods for Image Processing. academic year

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function

Adaptive data hiding based on VQ compressed images

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

An Efficient Information Hiding Scheme with High Compression Rate

Reversible Data Hiding VIA Optimal Code for Image

Robust DWT Based Technique for Digital Watermarking

A Compression Technique Based On Optimality Of LZW Code (OLZW)

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc

Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction

A New DCT Based Watermarking Method Using Luminance Component

LOSSLESS IMAGE COMPRESSION METHOD USING REVERSIBLE LOW CONTRAST MAPPING (RLCM)

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

Pattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition

Improving LZW Image Compression

Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift

Image Error Concealment Based on Watermarking

Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique

Robust Image Watermarking based on DCT-DWT- SVD Method

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Digital Image Steganography Using Bit Flipping

Fundamentals of Multimedia. Lecture 5 Lossless Data Compression Variable Length Coding

Digital Image Steganography Techniques: Case Study. Karnataka, India.

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION

Multilayer Data Embedding Using Reduced Difference Expansion

High Capacity Data Hiding Scheme for DCT-based Images

An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode

Robust Lossless Data Hiding. Outline

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

Visualizing Lempel-Ziv-Welch

Steganography by using Logistic Map Function and Cellular Automata

Quality based JPEG Steganography using balanced Embedding Technique

Robust Image Watermarking Based on Compressed Sensing Techniques

DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS

1 An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

Using data reduction to improve the transmission and rendering. performance of SVG maps over the Internet

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

A QUAD-TREE DECOMPOSITION APPROACH TO CARTOON IMAGE COMPRESSION. Yi-Chen Tsai, Ming-Sui Lee, Meiyin Shen and C.-C. Jay Kuo

Journal of Computer Engineering and Technology (IJCET), ISSN (Print), International Journal of Computer Engineering

Random Image Embedded in Videos using LSB Insertion Algorithm

An Adaptive Color Image Visible Watermark Algorithm Supporting for Interested Area and its Application System Based on Internet

Digital Watermarking on Micro Image using Reversible Optical Reproduction

Removing Spatial Redundancy from Image by Using Variable Vertex Chain Code

A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution

A Novel Information Security Scheme using Cryptic Steganography

IMAGE PROCESSING (RRY025) LECTURE 13 IMAGE COMPRESSION - I

A Methodology to Detect Most Effective Compression Technique Based on Time Complexity Cloud Migration for High Image Data Load

International Journal of Advanced Research in Computer Science and Software Engineering

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Data Hiding Scheme For Side Match Vector Quantization and Arnold Decoding

Single Bitmap Block Truncation Coding of Color Images Using Hill Climbing Algorithm

A Color Image Digital Watermarking Scheme Based on SOFM

Lempel-Ziv-Welch Compression

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

High capacity data hiding scheme based on (7, 4) Hamming code

sensors ISSN

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

An Improved Performance of Watermarking In DWT Domain Using SVD

Image coding and compression

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Transcription:

International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2016) An Improved Reversible Data-Hiding Scheme for LZW Codes Wenqiang Zhao a, Bailong Yang b, Shizhong Gong c, Xuesong Li d Xi an high-tech Institution, Xi an 710025, China aqqingnine@163.com, byangbl_68@163.com, cgszmeself@163.com, dlixsnzz@163.com Abstract. HPDH-LZW is a reversible data hiding scheme based on Lempel-Ziv-Welch (LZW) compression codes. It could achieve better hiding capacity by increasing the number of symbols available to hide secrets and faster hiding and extracting speeds due to the lower computation requirements. HPDH-LZW scheme embeds secret data in LZW compression codes by modifying the value of the compression codes, but the modified LZW compression codes is not continuous so that its data space could not be fully used. To solve this problem, we subdivide the compression codes data space and hide different number of secret data in different subspaces. Guided by the idea we realize an improved reversible data-hiding scheme for LZW codes. Experiments show that the scheme we proposed has greater data hiding capacity without increasing the size of the compression file and computational complexity when compared with HPDH-LZW scheme. Keywords: Data Hiding; LZW Compression; Compression Codes. 1. Introduction With the extensive application of multimedia technology and rapid development of Internet, the phenomenon that huge amounts of data are transmitted over the Internet becomes widespread. It is necessary to encrypt sensitive data before transmission to protect those data in the face of a growing number of security threats. Reversible data-hiding techniques [1, 2] provide a solution which can ensure that the receiver can receive hidden messages and recover carrier data without distortion. In a reversible data hiding scheme, the secret data are embedded in a reversible way so that one can not only extract the hidden data but also restore the original cover media without any distortion. Because of its good invisibility and high data hiding capacity, it can effectively protect the sensitive data, which makes it be widely used in military, judicial, medicine and other fields. Reversible data hiding scheme is mainly divided into spatial domain, transformed domain and the compression domain [3-5]. The reversible data hiding scheme in the compression domain could guarantee the safety of the transmitted data and reduce the transmission costs at the same time. LZW compression algorithm, named after Lemple, Ziv, and Welch [6], is a lossless compression method. It mainly used for image compression and has high compression rate and decompression speed. With the help of a established string table, LZW algorithm could denote a long string by a short code, so it is called string table compression algorithm as well. In the compression process, LZW algorithm gradually and dynamically generates corresponding relationships of the string and compression codes, and the relationship is a "dictionary" implicited in the compressed data. In the decompression process, the dictionary is gradually generated to recover the data. It is not necessary to analysis the source file and send additional information to the receiver [7] in the LZW compression. Currently, various reversible data hiding schemes based on LZW have been published [8, 9]. HPDH-LZW scheme [10] (A high-performance reversible data-hiding scheme for LZW codes), is a new reversible data hiding scheme. This scheme hides data through the relationship between the value of the output compression codes and the size of the dictionary. It has much higher data hiding capacity and lower computation costs than other methods. But its compression codes are highly discrete, and its compression codes data space could not be fully used. In order to solve this problem, we propose an improved reversible data-hiding scheme for LZW codes, which has a greater data hiding capacity without increasing the size of the compression file and computational complexity when compared with HPDH-LZW scheme. The capacity, one of the most important properties of data hiding schemes, is increased in the proposed scheme. The rest of this paper is organized as follows: In Section 2, the LZW compression 2016. The authors - Published by Atlantis Press 150

and HPDH-LZW scheme are briefly described repectively. The proposed scheme is introduced in Section 3, and Section 4 illustrates the experimental results. In Section 5 we summarize the contributions of our scheme. 2. Related works 2.1 The LZW algorithm In LZW algorithm, the root dictionary is initialized with ASCII values from 0 to 255 and expansion dictionary is created when the program is running. Whenever a character is input, LZW will check whether the new string formed by the old character (string) and newly input character is included in the dictionary; if so, it continue to read the next character; if not, it will add the new string to the dictionary, output the index of the old character (string) in dictionary, and assign the newly input character to the old character (string). The above process will be performed until entire file is read. When decoding, the dictionary is dynamically and automatically generated as well, LZW codes are converted to the corresponding string according to the dictionary. 2.2 The HPDH-LZW scheme HPDH-LZW algorithm is based on LZW algorithm. In HPDH-LZW algorithm, as long as a new dictionary entry is generated, a secret information bit could be hided. The number of hidden secret bits is the same as the number of newly generated dictionary entries. (1)The hiding algorithm of HPDH-LZW: Input: Source file and secret file. Output: LZW codes. Step 1 Get the first character c0 from the source file. Set s=c0, where s is a string variable. Step 2 If s exists in the dictionary, Set the previous symbol sp= s. Get the next character c from the source file and set s=s c, where means the concatenation operation. Get next secret bit b. Get the code C, where C is the dictionary indices of sp. If b= 1 Set C=C+Size, where Size is the current size of dictionary. Step 3 Output C and add s into dictionary. Set s = cs, where cs is the last character of s. Continue to Step 2. (2)The data-extracting algorithm of HPDH-LZW: Input: LZW codes. Output: Source file and secret file. Step 1 Get a LZW code C0. If C0 > Size, where Size is the current dictionary size, Set C0 =C0 -Size. Secret bit= 1. Secret bit= 0. Output s, where s is the symbol of C0 in the dictionary. Get character cs, where cs is the first character of s. Set O = C0, where the O is the old code. Step 2 Get the next LZW code C. If C >Size +1 Set C =C -Size -1. Secret bit= 1. 151

, Secret bit= 0. If C is not in the dictionary, Set s =so cs, where s is a string variable, and so is the symbol of O in the dictionary., Set s = so, where so is the symbol of O in the dictionary. Output s. Set snew = so cs, where snew is a new symbol, so is the symbol of O in the dictionary, and cs is the first character of s. Add snew into the dictionary. Step 3 Set O =C and continue to Step 2. 3. The proposed scheme The main idea of the HPDH-LZW scheme is to modify the value of LZW code to hide data, then we could hide a secret bit when a new dictionary is generated. If the secret bit is 1, the output LZW code is the sum of the value of the LZW code and the size of the current dictionary. In this case, the modified output LZW codes are high discrete and the compression codes data space may not be fully used. In this paper, we subdivide the compression codes data space and hide different number of secret data in different subspaces and the problem is improved. When the size of dictionary is less than or equal to 384, the information hiding and extraction process are introduced in Section 3.1 and 3.2 respectively; when the dictionary size is greater than 384, hiding and extraction process is the same as HPDH-LZW algorithm. 3.1 The hiding algorithm of proposed scheme: Input: Source file and secret file. Output: LZW codes. Step 1 Get the first character c0 from the source file. Set s=c0, where s is a string variable. Step 2 If s exists in the dictionary, Set the previous symbol sp= s. Get the next character c from the source file and set s=s c, where means the concatenation operation. Get next secret bit b. Get the code C, where C is the dictionary indices of sp. If b= 1 If C>255 Set C= Size + (Size C), where Size is the current size of dictionary. Get next secret bit bnext If bnext =1 Set C=C+768; Set C=C+512, return bnext to the source file. C remains the same. Step 3 Output C and add s into dictionary. Set s = cs, where cs is the last character of s. Continue to Step 2. 3.2 The data-extracting algorithm of proposed scheme: Input: LZW codes. Output: Source file and secret file. Step 1 Get a LZW code C0. 152

Let ItemPt be the current dictionary size. If C0 [ItemPt, 512), get Secret bit= 1, Set C0 = (ItemPt+1)*2-C0 ; If C0 [512, 768), get Secret bit= 1, Set C0 = C0-512; If C0 [768, 1024), get Secret bit= 11, Set C0 =C0-768; get a Secret bit= 0. Output s, where s is the symbol of C0 in the dictionary. Get character cs, where cs is the first character of s. Set O =C0, where the O is the old code. Step 2 Get the next LZW code C. If C [ItemPt, 512), get Secret bit= 1, Set C = (ItemPt+1)*2-C ; If C [512, 768), get Secret bit= 1, Set C =C -1-512; If C [768, 1024), get Secret bit= 11, Set C =C -1-768; get a Secret bit= 0. If C is not in the dictionary, Set s =so cs, where s is a string variable, and so is the symbol of O in the dictionary. Set s = so. Output s. Set snew = so cs, where snew is a new symbol, so is the symbol of O in the dictionary, and cs is the first character of s. Add snew into the dictionary. Step 3 Set O =C and continue to Step 2. 4. Experimental results We use the texts and the pictures in the HPDH-LZW scheme as the test object. Text test objects are: Lincoln s Gettysburg address ( Lincoln.txt ), Obama s speech ( Obama.txt ), a smaller size research paper ( paper-s.txt ), and a larger size research paper ( paper-b.txt ). 10 256pix x 256pix grayscale test images are Baboon, Boat, Goldhill, Jet (F16), Lena, Pepper, SailBoat, Tiffany, Toys, and Zelda. The secret data file used in the experiment is generated by random generator. The length of each LZW compression code is 10 bits, and the size of the initial dictionary and the additional dictionary are both 256. As shown in Table 1 and Table 2, data hiding capacity of our improved algorithm for texts and images except Paper-s.txt and Jet have increased. In average, the hiding capacity of our algorithm for text was increased by 7.77% and that for image was increased by 12.34%. The hiding capacity of Paper-s.txt is 25574 in the HPDH-LZW scheme, and we consider this data is incorrect. File name Table 1 Comparison to HPDH-LZW scheme for text data HPDH-LZW Proposed scheme Original size Hidden bit(a) Hidden bit(b) Increased bits (B-A)/A Obama.txt 13504 8856 9529 7.60% Lincoln.txt 1450 912 998 9.43% Paper-b.txt 80316 50939 54138 6.28% Paper-s.txt 20079 25574 13678 153

File name Table 2 Comparison to HPDH-LZW scheme for image data HPDH-LZW proposed scheme Original size Hidden bit(a) Hidden bit (B) Increased bits (B-A)/A Baboon 65536 63844 70861 10.99% Boat 65536 52980 61416 15.92% Goldhill 65536 59577 67450 13.21% Jet 65536 52090 49056-5.82% Lena 65536 61437 67153 9.30% Pepper 65536 60839 68637 12.82% SailBoat 65536 58498 67367 15.16% Tiffany 65536 56627 66913 18.16% Toys 65536 49572 52396 5.70% Zelda 65536 60771 66722 9.79% As we can see in Table 1 and Table 2, the data hiding capacity for images is lager than that of text. This is because the text data is constituted by ASCII code 0-127 and image pixel value range in 0-255 so that the improved scheme may output more root dictionary representation of the character on image data. Hiding more continuous secret bit 1 in the output of root dictionary output is only suitable for the situation that the size of extended dictionary is small (for example, in this paper, the size of the root dictionary and the extended dictionary is 256). If the size of the extended dictionary is larger than root dictionary, we may infer that more continuous secret bit 1 are hidden in the output of extended dictionary. Our method provides a way to increase the amount of data hiding, but specific solutions are needed in the face of specific issues. The improved scheme optimizes the LZW encoding method, therefore it can hide more secret data. At the same time, they have same method in the dictionary generation, the size of the compression file and computational complexity is not increased. The experimental results show that the improved scheme is effective. 5. Conclusion In this paper, an improved reversible data hiding scheme based on LZW compression coding is proposed. Through the rational division and the full use of the data space that the 10 bit codes could represent, the improved scheme can hide more secret data. The improved scheme and the original scheme share the same method in the dictionary generation, so our scheme does not increase the size of the compression file and computational complexity. The experimental show that the scheme we proposed has greater data hiding capacity. References [1].Tai, W.L., Yeh, C.M., Chang, C.C., 2009. Reversible data hiding based on histogram modification of pixel differences. IEEE Transactions on Circuits and Systems for Video Technology 19(6), 906 910. [2].Tseng, H.W., Chang, C.C., 2008. An extended difference expansion algorithm for reversible watermarking. Image and Vision Computing 26(8), 1148 1153. [3].Chang, C.C., Wu, W.C., 2005. A steganographic method for hiding secret data using side match vector quantization. IEICE Transactions on Information and Systems E88 D(9), 2159 2167. 154

[4].Chen, W.J., Huang, W.T., 2009. VQ indexes compression and information hiding using hybrid lossless index coding. Digital Signal Processing 19(3), 433 443. [5].Jo, M., Kim, H.D., 2002. A digital image watermarking scheme based on vector quantisation. IEICE Transactions on Information and Systems E85-D(6), 1054 1056. [6].Gonzalez, R.C., Woods, R.E., 2002. Digital Image Processing, 2nd Edition, Prentice Hall, Jan. [7].Nandi, U., Mandal, J.K., 2012. A compression technique based on optimality of LZW code (OLZW). In: 2012 Third International Conference on Computer and Communication Technology (ICCCT), Allahabad, pp.166 170. [8].Shim, H.J., Ahn, J., Jeon, B., 2004. DH-LZW: lossless data hiding in LZW compression. In: Proceedings of the International Conference on Image Processing, 4, Singapore, pp.2195 2198. [9].Chen, C.C., Chang, C.C., 2010. High-capacity reversible data-hiding for LZW codes. In: Proceedings of the 2nd International Conference on Computer Modeling and Simulation, 1, Sanya, China, pp.3 8. [10].Wang, Z.H., Yang, H.R., Cheng, T.F., Chang, C.C., 2013. A high-performance reversible data-hiding scheme for LZW codes. The Journal of Systems and Software 86(11), pp.2771-2778. 155