Po-Yueh Chen* and Wei-Chih Chen

Department of Computer Science and Information Engineering, National Changhua University of Education, Changhua, Taiwan, R.O.C


 

Download Citation: |
Download PDF


ABSTRACT


Because of the prevalence of internet, the information security issues have attracted much attention in recent years. Protecting privacy of exchanging information through media becomes the subject of many studies. The Quantization in JPEG is to encode the coefficients transformed by Discrete Cosine Transform (DCT) using a Quantization Table (QT) generated by a quality factor. Quantizing DCT coefficients by different QTs can be adopted to record the secret messages. Based on the variation of QTs, we propose two schemes in frequency domain to improve a data hiding method, in terms of correct extraction rate and image quality. Experimental results show that the proposed approaches can provide better correct extraction rate, higher image quality, and satisfactory embedding capacity.


Keywords: JPEG; Quantizationt table; discrete cosine transform; discrete wavelet transform.


Share this article with your colleagues

 


REFERENCES


  1. [1] Zhang, X. Reversible Data Hiding in Encrypted Image, IEEE Signal Processing Letters, 18: 255-258.

  2. [2] Fallahpour, M., Megias, D. and Ghanbari, M. 2011. Reversible and High-capacity Data Hiding in Medical Images, IET Image Processing, 5: 190-197.

  3. [3] Lai, C.C. and Tsai, C.C. 2010. Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition, IEEE Transactions on Instrumentation and Measurement, 59: 3060-3063.

  4. [4] Yusof, Y. and Khalifa, O.O. 2008. Imperceptibility and Robustness Analysis of DWT-based Digital Image Watermarking, International Conference on Computer and Communication Engineering, Malaysia, May 2008.

  5. [5] Khan, M.I., Jeoti, V. and Malik, A.S. 2011. Designing a Joint Perceptual Encryption and Blind Watermarking Scheme Compliant with JPEG Compression Standard, International Conference on Computer Applications and Industrial Electronics, Malaysia, March 2011.

  6. [6] Almohammad, A., Hierons, R.M. and Ghinea, G. 2008. High Capacity Steganographic Method Based Upon JPEG, of 3rd IEEE International Conference on Availability, Reliability and Security, Barcelona, Spain, May 2008.

  7. [7] Kornblum, J.D. 2008. Using JPEG Quantization Tables to Identify Imagery Processed by Software, Digital Investigation, 5: 21-25.

  8. [8] Guo, J.M. and Le, T.N. 2010. Secret Communication Using JPEG Double Compression, IEEE Signal Processing Letters, 17: 879 -882.

  9. [9] Liu, P.F., Liang, B.Z., and Peng, C. 2010. A DWT-DCT Based Blind Watermarking Algorithm for Copyright Protection, of 3rd IEEE International Conference on Computer Science and Information Technology, Beijing, China, September 2010.

  10. [10] Wang, N., Wang, Y., and Li, X. 2009. A Novel Robust Watermarking Algorithm Based on DWT and DCT, Proc. of International Conference on Computational Intelligence and Security, Beijing, China, December 2009.


ARTICLE INFORMATION


Received: 2013-09-10
Revised: 2014-10-14
Accepted: 2014-11-20
Publication Date: 2015-03-01


Cite this article:

Chen, P.Y., Chen, W.C. 2015. Secret communication based on quantization tables. International Journal of Applied Science and Engineering, 13, 37–54. https://doi.org/10.6703/IJASE.2015.13(1).37