Abstract
This paper extends the bandwidth of Lempel-Ziv-Welch (LZW) and Lempel Ziv Fiala Greene (LZFG) compression schemes to hide information in the compressed codes for compressed data authentication. The proposed schemes are designed for two objectives; one is to compress a text file; the other is to hide secret information to warrant its authenticity. According to the results of experiment, the proposed scheme could easily and efficiently reach the objective of hiding secret information and only with negligible degradation in compression performance. In addition, the proposed scheme can be even used to hide secret information in medical images without distorting the image quality.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Atallah, J.: Handbook on Algorithms and Theory of Computation. CRC Press, Florida (1998)
Atallah, M.J., Lonardi, S.: Authentication of LZ–77 Compressed Data. In: Proceedings of the ACM Symposium on Applied Computing, pp. 282–287 (2003)
Blum, L., Blum, M., Shub, M.: A Simple Unpredictable Pseudo–random Number Generator. SIAM Journal on Computing 15, 364–383 (1986)
Chang, C.C., Chan, C.S.: A Watermarking Scheme Based on Principal Component Analysis Technique. Informatica 14, 431–444 (2003)
Huang, D., Yan, H.: Interword Distance Changes Represented by Sine Waves for Watermarking Text Images. IEEE Transactions on Circuits and Systems for Video Technology 11, 1237–1245 (2001)
Hwang, M.S., Chang, C.C., Hwang, K.F.: Digital Watermarking of Images Using Neural Networks. Journal of Electronic Imaging 9, 548–555 (2000)
Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking – Attacks and Countermeasures. Kluwer Academic Publishers, Boston (2001)
Katzenbeisser, S., Petitcolas, A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Norwood (2000)
Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document Identification for Copyright Protection Using Centroid Detection. IEEE Transactions on Communications 46, 372–383 (1998)
Lu, C.S., Liao, H.M.: Structural Digital Signature for Image Authentication: an Incidental Distortion Resistant Scheme. IEEE Transactions on Multimedia 5, 161–173 (2003)
Mukherjee, D.P., Maitra, S., Acton, S.T.: Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication. IEEE Transactions on Multimedia 6, 1–15 (2004)
Sayood, K.: Introduction to Data Compression. Academic Press, Morgan Kaufmann Publishers, SanDiego, CA (2000)
Sedgewick, R.: Algorithms, 2nd edn. Addison-Wesley Publishing Company, Reading (1988)
The test files courtesy of T. Bell and M. Powell may be found, at http://corpus.canterbury.ac.nz/index.html
Welch, T.A.: A Technique for High Performance Data Compression. IEEE Transactions on Computers 17, 8–19 (1984)
Ziv, J., Lempel, A.: A Universal Algorithm for Sequential Data Compression. IEEE Transactions on Information Theory 23, 337–342 (1997)
Ziv, J., Lempel, A.: Compression of Individual Sequences via Variable–Rate Coding. IEEE Transactions on Information Theory 24, 530–536 (1978)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, CC., Lu, TC., Yeh, JB. (2005). A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3684. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11554028_36
Download citation
DOI: https://doi.org/10.1007/11554028_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28897-8
Online ISBN: 978-3-540-31997-9
eBook Packages: Computer ScienceComputer Science (R0)