Compressing JPEG compressed image using reversible data hiding technique

Sang Ug Kang, Xiaochao Qu, Hyoung Joong Kim

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)

    Abstract

    Since the concept of reversible data hiding technique was introduced, many researchers have applied it for authentication of uncompressed images. In this paper, an algorithm is introduced to compress JPEG files again without any loss in image quality. The proposed method can modify an entire segment of VLC codeword sequence to embed a bit of data. The modified codewords may destroy the correlation, or the smoothness, between neighboring pixels of the recovered image. The data extractor utilizes the smoothness change to know the hidden data. For this, a novel smoothness measurement function which uses both inter- and intra-MAD values is proposed. When the smoothness change is small, two consecutive segments are concatenated to extract correct data with higher smoothness sensitivity. As a result, compression ratio or embedding capacity is increased in most natural images.

    Original languageEnglish
    Title of host publication2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013
    DOIs
    Publication statusPublished - 2013
    Event2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013 - Kaohsiung, Taiwan, Province of China
    Duration: 2013 Oct 292013 Nov 1

    Publication series

    Name2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013

    Other

    Other2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013
    Country/TerritoryTaiwan, Province of China
    CityKaohsiung
    Period13/10/2913/11/1

    ASJC Scopus subject areas

    • Information Systems
    • Signal Processing

    Fingerprint

    Dive into the research topics of 'Compressing JPEG compressed image using reversible data hiding technique'. Together they form a unique fingerprint.

    Cite this