A novel scheme for securing image steganography

Chin Chen Chang, Jyh Chiang Yeh, Ju Yuan Hsiao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)


In this paper, we shall propose a more secure scheme with a larger embedding capacity for image steganography based on vector quantization and discrete cosine transform. Instead of encrypting the whole secret image, our method only encrypts the important features extracted from a secret image and then embeds the encrypted features into a cover image for producing a stego-image. During the work of data encryption and embedment, we introduce the data encryption standard cryptosystem and a pseudo random mechanism to ensure the security of the secret image. Besides, the distortion between the cover image and the stego-image is also imperceptible by the human eye, even when the size of the secret image is as large as that of the cover image. According to the substantial experimental results we shall give later, we can demonstrate the applicability of our method.

Original languageEnglish
Title of host publicationAdvances in Multimedia Information Processing - PCM 2001 - 2nd IEEE Pacific Rim Conference on Multimedia, Proceedings
EditorsHeung-Yeung Shum, Mark Liao, Shih-Fu Chang
PublisherSpringer Verlag
Number of pages8
ISBN (Print)3540426809, 9783540426806
Publication statusPublished - 2001
Event2nd IEEE Pacific-Rim Conference on Multimedia, IEEE-PCM 2001 - Beijing, China
Duration: 2001 Oct 242001 Oct 26

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other2nd IEEE Pacific-Rim Conference on Multimedia, IEEE-PCM 2001

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A novel scheme for securing image steganography'. Together they form a unique fingerprint.

Cite this