2007
DOI: 10.1016/j.jvcir.2006.11.005
|View full text |Cite
|
Sign up to set email alerts
|

Lossless recovery of a VQ index table with embedded secret data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
48
0
1

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 61 publications
(49 citation statements)
references
References 10 publications
0
48
0
1
Order By: Relevance
“…One of the most common compression algorithms is VQ, which is an attractive option because of its simplicity and cost-effectiveness. Recently, Tu et al [98] presented an advanced version of the steganographic scheme proposed in [15], which is based on a vector quantization image compression technique. The steganographic schemes based on DWT and DCT can be found in [12,42,58,118].…”
Section: Steganographymentioning
confidence: 99%
“…One of the most common compression algorithms is VQ, which is an attractive option because of its simplicity and cost-effectiveness. Recently, Tu et al [98] presented an advanced version of the steganographic scheme proposed in [15], which is based on a vector quantization image compression technique. The steganographic schemes based on DWT and DCT can be found in [12,42,58,118].…”
Section: Steganographymentioning
confidence: 99%
“…In recent years, the protection of digital information transmitted over the network has become extremely important. Data hiding [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16] and cryptography [17][18][19] have become two important secure techniques for data protection. In encryption systems, encryption techniques, such as data encryption standard (DES) [17], RSA [18] and AES [19] protect secret messages by transforming them into the cipher text which usually seems meaningless.…”
Section: Introductionmentioning
confidence: 99%
“…In order to save bandwidth or space for data transmission or storage, many data hiding schemes in compression domain based on the vector quantization techniques (VQ) have been proposed [5][6][7][8][9][10][11][12][13][14][15]. In 2004, Chang et al proposed a reversible VQ-based data hiding scheme which embed the secret message into searchorder-coding (SOC) compression codes [5].…”
Section: Introductionmentioning
confidence: 99%
“…In such schemes the amount of similarity between the codewords corresponding to the indices to be replaced with each other isn't taken into consideration, in addition in most of them some additional information is added into the index table for recovery purpose. Literatures [22,11,31] embed data by index mapping techniques based on refer counts of the indices. The idea behind literatures [2,5,9,23,30] is to map the indices based on side match prediction.…”
Section: Introductionmentioning
confidence: 99%