Simultaneous Reversible Data Hiding and Quality Enhancement for VQ-Compressed Images via Quality Improvement Codes
Abstract
1. Introduction
1.1. Background and Motivation
1.2. Related Works
1.2.1. Vector Quantization (VQ)
1.2.2. Data Hiding Techniques for VQ-Compressed Images
- From SOC to Recent Compressed-Domain RDH Directions:
- Joint Neighboring Coding (JNC)-related schemes:
- Locally Adaptive Coding (LAS)-related schemes:
- Index frequency/sorting-based schemes:
- Difference index-based schemes:
- Schemes using codebooks as carriers:
1.3. Research Gap and Main Contributions
- Unified Framework for Simultaneous RDH and Quality Enhancement: We propose a VQ-based framework that performs reversible data hiding and image quality enhancement without introducing additional transmission overhead, which is particularly beneficial for bandwidth-constrained and latency-sensitive networked environments such as IoT edge devices and mobile healthcare systems.
- Novel QIC Mechanism with RIV Algorithm: A Quality Improvement Code (QIC) mechanism is introduced, combining difference codebooks (DC) with the Recoding Index Value (RIV) algorithm. This mechanism embeds secret data while enhancing the perceptual quality of decompressed images by restoring lost high-frequency details in edge-marked blocks, making it highly suitable for visual data protection in distributed multimedia systems.
- Comprehensive Experimental Validation: Comprehensive experiments on ten standard test images demonstrate consistent PSNR improvements of +4 to +5.39 dB over baseline VQ methods, with SSIM gains up to +9.86% and embedding capacities approaching 100 Kbits. These results validate robustness and generalizability under varying image contents, resolutions (256 × 256, 512 × 512), and codebook sizes (64–1024). For instance, in the Zelda (512 × 512) case, SSIM improves from 94.10% to 98.23% while PSNR increases from 37.23 dB to 42.62 dB, achieving near-lossless reconstruction suitable for high-fidelity applications such as medical imaging, national defense, and forensic analysis.
- The proposed method employs compact IC/DC codebooks that are trained once offline and reused during deployment, eliminating the need for neural-network training or inference. This design minimizes computational overhead while achieving comparable or superior PSNR gains, making it well-suited for resource-constrained platforms such as wireless sensor nodes, surveillance cameras, and mobile healthcare terminals, where both real-time processing and high visual fidelity are essential.
2. Materials and Methods
2.1. Framework Overview and Notation
2.2. Framework Overview
- Image Codebook (IC) Training:
- Difference Codebook (DC) Training:
2.3. Encoding and Reconstruction Phase
| Algorithm 1. Encoding Quality Improvement Codes (QIC) | |
| Encoding Algorithm | |
| Input: | • Original image I ∈ ℝ(M × N) • Secret bitstream S = {s1, s2, …, s|S|} • Image Codebook IC = {c1^IC, …, c_NIC} • Difference Codebook DC = {c1^DC, …, c_iDC} |
| Output: | Modified VQ index table VQ-IT′ embedding secret bits and QIC |
| |
| Algorithm 2. Recoding Index Value (RIV) |
| RIV-Encoding Phase |
| Input: • Difference block DM_b ∈ ℝ(4 × 4) • Secret bitstream s ∈ {0, 1}b • Difference Codebook DC = {c1DC,…, ciDC} • Embedding rate b |
| Output: • Expanded DC index i′ ∈ [0, 2b× n − 1]; • Quality Improvement Code block QIC_b |
|
| RIV-Decoding Phase |
| Input: • Expanded DC index i′ ∈ [0, 2b× n − 1] • Difference Codebook DC • Embedding rate b |
| Output: Recovered secret bits s ∈ {0, 1}b and Quality Improvement Code block QIC_b |
|
3. Experiments
3.1. Experimental Setup and Dataset Description
- Hardware: Intel Core i7-12700H CPU (Intel Corporation, Santa Clara, CA, USA), 16 GB RAM
- Operating System: Windows 10/11 64-bit (Microsoft Corporation, Redmond, WA, USA)
- Programming Environment: Python 3.12 (Python Software Foundation, https://www.python.org)
- Python Libraries:
- ○
- NumPy 1.26.4 (https://numpy.org)
- ○
- OpenCV-Python 4.10.0.84 (https://github.com/opencv/opencv-python), accessed on 10 November 2025
- ○
- scikit-image 0.23.2 (https://scikit-image.org)
3.2. Embedding Capacity and Payload Analysis
3.3. Experimental Results
3.4. Visual Quality Enhancement
3.4.1. Experiments on Grayscale Images
3.4.2. Experiments on Color Images
- Experimental Results for Lena
- Experimental Results for Baboon
3.4.3. Analysis and Discussion
- Consistent Quality Enhancement—Both test images exhibit steady PSNR gains of 1.15–1.24 dB and SSIM improvements of ≈ 0.009, achieved without additional transmission overhead since QIC information is embedded within IC indices.
- Adaptive Edge Utilization—The edge detection process automatically adapts to image complexity, selecting fewer edge blocks for smooth content (Lena) and more for textured scenes (Baboon).
- Color Fidelity—Since only the luminance channel is processed, chrominance information remains unaltered. SSIM values above 0.89 confirm that color fidelity and perceptual similarity are well preserved.
3.5. Performance Analysis and Trade-Off Discussion
- Pre-training Architecture with Zero Computational Overhead: Unlike deep learning methods that require extensive training on large datasets (often 10,000+ images) and GPU inference, the proposed QIC framework operates purely through codebook lookup and algebraic operations. The computational complexity O(W × H + || × log(n)) is dominated by standard VQ encoding, with the additional QIC embedding introducing negligible overhead. For a 512 × 512 image with codebook size n = 512 and approximately 16,000 edge blocks, the total processing time on a standard CPU (Intel Core i7) is approximately 0.3 s, compared to 2–5 s for typical CNN-based methods requiring GPU acceleration. This makes the method immediately deployable on resource-constrained IoT devices, wireless sensor nodes, and edge cameras without requiring hardware upgrades or model retraining.
- Simultaneous Data Hiding and Quality Enhancement: A critical distinguishing feature is that the proposed method achieves two objectives simultaneously: (1) embedding up to 100 Kbits of secret data, and (2) improving visual quality over standard VQ decompression. In contrast, most deep learning image enhancement methods focus solely on quality improvement without data hiding capability. When data hiding is introduced into deep learning frameworks, it typically degrades image quality rather than enhancing it. The QIC mechanism uniquely leverages the residual information for dual purposes—the same difference codewords that carry secret bits also restore high-frequency edge details. This synergy is not achievable in conventional approaches that treat data hiding and quality enhancement as separate, competing objectives.
- No Additional Transmission Overhead: The proposed framework embeds both secret data and quality improvement codes within the existing VQ index table structure without increasing file size or transmission bandwidth. The RIV mechanism expands the index space mathematically (from n to 2b × n) but does not require transmitting additional auxiliary information. In comparison, many high-PSNR enhancement methods require transmitting residual maps, attention masks, or auxiliary networks, significantly increasing bandwidth requirements—a critical constraint in IoT and mobile applications where network resources are limited.
- Guaranteed Reversibility and Lossless Secret Recovery: The proposed method ensures perfect recovery of both the original VQ indices and the embedded secret data through the invertible RIV mapping (Equations (3) and (4)). This property is essential for applications in medical imaging, forensic analysis, and legal documentation where any loss of embedded authentication or metadata is unacceptable. Many deep learning steganography methods, despite achieving high visual quality, suffer from imperfect secret recovery (bit error rates of 0.1–1%) due to quantization and rounding errors in neural network operations.
- Embedding Capacity and Efficiency: The proposed method achieves embedding capacities of 90,000–100,000 bits on 512 × 512 images, substantially higher than typical VQ-based methods (32,000–64,000 bits as shown in Table 4). More importantly, the Pure Payload Ratio (PPR) of approximately 43% (for b = 6, n = 256) indicates that nearly half of the transmitted bits carry actual secret information, with the remainder representing structural overhead. This efficiency is comparable to or better than many existing VQ-based schemes while simultaneously providing a quality improvement combination not achieved by prior work.
- Scalability and Adaptability: The method’s performance scales predictably with codebook size and Sobel threshold, as demonstrated in Table 2 and Table 3 and Figure 3 and Figure 4. This predictability enables system designers to precisely balance quality, capacity, and computational cost based on application requirements. For instance, in bandwidth-critical scenarios, smaller codebooks (n = 64) can be used with acceptable quality (ΔPSNR ≈ +4 dB), while high-fidelity applications can employ larger codebooks (n = 1024) for near-lossless reconstruction (ΔPSNR ≈ +5.39 dB). Such flexibility is difficult to achieve in deep learning methods, where model architecture changes require complete retraining.
- Trade-off Analysis: It is acknowledged that for applications where absolute PSNR maximization is the sole objective and computational resources are unconstrained, deep learning methods may achieve 2–3 dB higher PSNR than the proposed approach. However, for the target application domain—resource-constrained IoT devices requiring simultaneous secure data embedding and quality enhancement with minimal computational and transmission overhead—the proposed method offers a more favorable trade-off. The combination of pre-training operation, zero transmission overhead, guaranteed reversibility, high embedding capacity, and substantial quality improvement (ΔPSNR +4 to +5.39 dB, ΔSSIM +4% to +10%) makes the framework particularly well-suited for practical deployment in surveillance systems, mobile healthcare terminals, and defense communication networks.
3.6. Robustness Under Noisy Conditions and JPEG Compression
- Under low-noise conditions, all methods perform comparably.
- Under medium-to-heavy noise (e.g., σ = 20, S&P = 3%), JPEG exhibits noticeable degradation—particularly in SSIM—with visible blocking artifacts.
- QIC maintains stable performance across all noise levels and achieves higher SSIM than JPEG and VQ under noisy conditions, while its PSNR remains competitive with the best baseline.
- Unlike JPEG or VQ, QIC provides both reversible embedding and structural enhancement within a single, unified pipeline.
3.7. Runtime Evaluation
4. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Huang, C.; Wang, W.; Wang, S. A Novel Data Hiding and Reversible Scheme Using SMN Blocks in VQ-Compressed Images. Opto-Electron. Rev. 2011, 19, 225–233. [Google Scholar] [CrossRef]
- Zhao, D.-N.; Xie, W.-X.; Lu, Z.-M. High Efficiency Reversible Data Hiding for Two-Stage Vector Quantization Compressed Images. J. Inf. Hiding Multimed. Signal Process. 2014, 5, 601–610. [Google Scholar]
- Wang, Y.-L.; Shen, J.-J.; Hwang, M.-S. A Survey of Reversible Data Hiding for VQ-Compressed Images. Int. J. Netw. Secur. 2018, 20, 1–10. [Google Scholar] [CrossRef]
- Li, Y.; Chang, C.-C.; He, M. High Capacity Reversible Data Hiding for VQ-Compressed Images Based on Difference Transformation and Mapping Technique. IEEE Access 2020, 8, 32226–32245. [Google Scholar] [CrossRef]
- Xu, S.; Chang, C.-C.; Liu, Y. A High-Capacity Reversible Data Hiding Scheme for Encrypted Images Employing Vector Quantization Prediction. Multimed. Tools Appl. 2021, 80, 20307–20325. [Google Scholar] [CrossRef]
- Xu, S.; Horng, J.-H.; Chang, C.-C. Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images. IEEE Access 2021, 9, 55191–55204. [Google Scholar] [CrossRef]
- Naik, Y.G.R.; Shetty, N.R.; Vidyasagar, K.B. A Study and Analysis of Reversible Data Hiding Techniques. In Proceedings of the 2024 Second International Conference on Advances in Information Technology (ICAIT), Chikmagaluru, India, 24–27 July 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Ni, Z.; Shi, Y.-Q.; Ansari, N.; Su, W. Reversible Data Hiding. IEEE Trans. Circuits Syst. Video Technol. 2006, 16, 354–362. [Google Scholar] [CrossRef]
- Delp, E.J.; Mitchell, O.R. Image Compression Using Block Truncation Coding. IEEE Trans. Commun. 1979, 27, 1335–1342. [Google Scholar] [CrossRef]
- Welch, T.A. A Technique for High-Performance Data Compression. Computer 1984, 17, 8–19. [Google Scholar] [CrossRef]
- Linde, Y.; Buzo, A.; Gray, R. An Algorithm for Vector Quantizer Design. IEEE Trans. Commun. 1980, 28, 84–95. [Google Scholar] [CrossRef]
- Chang, C.-C.; Hu, Y.-C. A Fast LBG Codebook Training Algorithm for Vector Quantization. IEEE Trans. Consum. Electron. 1998, 44, 1201–1208. [Google Scholar] [CrossRef]
- Ma, X.; Pan, Z.; Hu, S.; Wang, L. New High-Performance Reversible Data Hiding Method for VQ Indices Based on Improved Locally Adaptive Coding Scheme. J. Vis. Commun. Image Represent. 2015, 30, 191–200. [Google Scholar] [CrossRef]
- Lin, C.-C.; Lee, T.-L.; Chang, Y.-F.; Shiu, P.-F.; Zhang, B. Fragile Watermarking for Tamper Localization and Self-Recovery Based on AMBTC and VQ. Electronics 2023, 12, 415. [Google Scholar] [CrossRef]
- Chang, C.-C.; Chen, G.-M.; Lin, M.-H. Information Hiding Based on Search-Order Coding for VQ Indices. Pattern Recognit. Lett. 2004, 25, 1253–1261. [Google Scholar] [CrossRef]
- Wang, J.-X.; Lu, Z.-M. A Path Optional Lossless Data Hiding Scheme Based on VQ Joint Neighboring Coding. Inf. Sci. 2009, 179, 3332–3348. [Google Scholar] [CrossRef]
- Chang, C.-C.; Kieu, T.D.; Chou, Y.-C. Reversible Information Hiding for VQ Indices Based on Locally Adaptive Coding. J. Vis. Commun. Image Represent. 2009, 20, 57–64. [Google Scholar] [CrossRef]
- Chang, C.-C.; Wu, W.-C.; Hu, Y.-C. Lossless Recovery of a VQ Index Table with Embedded Secret Data. J. Vis. Commun. Image Represent. 2007, 18, 207–216. [Google Scholar] [CrossRef]
- Sharma, R.; Gavalas, D.; Peng, S.-L. Smart and Future Applications of Internet of Multimedia Things (IoMT) Using Big Data Analytics. Sensors 2022, 22, 4146. [Google Scholar] [CrossRef]
- Li, C.; Xu, D.; Chen, K. Hierarchical Vector-Quantized Variational Autoencoder and Vector Credibility Mechanism for High-Quality Image Inpainting. Electronics 2024, 13, 1852. [Google Scholar] [CrossRef]
- Chen, J.; Zhu, T.; Song, H.; Ma, N.; Xu, X. VQ-DeepISC: Vector Quantized-Enabled Digital Semantic Communication with Channel Adaptive Image Transmission. arXiv 2025, arXiv:2508.03740. [Google Scholar] [CrossRef]
- Chen, S.; Liu, J.-C.; Chang, C.-C.; Chang, C.-C. Lossless Data Hiding in VQ Compressed Images Using Adaptive Prediction Difference Coding. Electronics 2024, 13, 3532. [Google Scholar] [CrossRef]
- Kong, X.; He, W.; Cai, Z. A Novel High-Fidelity Reversible Data Hiding Method Based on Adaptive Multi-Pass Embedding. Mathematics 2025, 13, 1881. [Google Scholar] [CrossRef]
- Gandhi, S.; Kumar, R. Survey of Reversible Data Hiding: Statistics, Current Trends, and Future Outlook. Comput. Stand. Interfaces 2025, 94, 104003. [Google Scholar] [CrossRef]
- Weng, C.-Y.; Yang, C.-H. Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm. Entropy 2023, 25, 209. [Google Scholar] [CrossRef] [PubMed]
- Pan, Z.; Wang, L. Novel Reversible Data Hiding Scheme for Two-Stage VQ Compressed Images Based on Search-Order Coding. J. Vis. Commun. Image Represent. 2018, 50, 186–198. [Google Scholar] [CrossRef]
- Gray, R. Vector Quantization. IEEE ASSP Mag. 1984, 1, 4–29. [Google Scholar] [CrossRef]
- Lin, Y.; Liu, J.-C.; Chang, C.-C.; Chang, C.-C. Embedding Secret Data in a Vector Quantization Codebook Using a Novel Thresholding Scheme. Mathematics 2024, 12, 1332. [Google Scholar] [CrossRef]
- Xue, Y.; Wang, Y.; Jiang, J.; Yu, Z.; Zhan, Y.; Fan, X.; Qiao, S. An Efficient Codebook Search Algorithm for Line Spectrum Frequency (LSF) Vector Quantization in Speech Codec. Electronics 2021, 10, 380. [Google Scholar] [CrossRef]
- Jiang, C.; Zhang, M.; Zhang, X.; Di, F. Reversible Data Hiding in Encrypted Images Based on Preprocessing-Free Variable Threshold Secret Sharing. Appl. Sci. 2024, 14, 5574. [Google Scholar] [CrossRef]
- Meng, Y.; Niu, K.; Zhang, Y.; Liang, Y.; Hu, F. Robust Reversible Watermarking Scheme in Video Compression Domain Based on Multi-Layer Embedding. Electronics 2024, 13, 3734. [Google Scholar] [CrossRef]
- Liu, R.-H.; Zhou, Q. Reversible Data Hiding in Encrypted Images Based on the Mixed Multi-Bit Layer Embedding Strategy. Appl. Sci. 2023, 13, 5696. [Google Scholar] [CrossRef]
- Lin, Y.; Liu, J.-C.; Chang, C.-C.; Chang, C.-C. Lossless Recompression of Vector Quantization Index Table for Texture Images Based on Adaptive Huffman Coding Through Multi-Type Processing. Symmetry 2024, 16, 1419. [Google Scholar] [CrossRef]
- Wang, X.; Liu, J.-C.; Chang, C.-C. A Novel Reversible Data Hiding Scheme for VQ Codebooks. Secur. Priv. 2023, 6, e315. [Google Scholar] [CrossRef]
- Zhou, Z.; Wang, C.; Yan, K.; Shi, H.; Pang, X. Reversible Data Hiding in Encrypted Images Based on Additive Secret Sharing and Additive Joint Coding Using an Intelligent Predictor. Front. Inf. Technol. Electron. Eng. 2024, 25, 1250–1265. [Google Scholar] [CrossRef]
- Tsai, Y.-Y.; Liu, H.-L.; Kuo, P.-L.; Chan, C.-S. Extending Multi-MSB Prediction and Huffman Coding for Reversible Data Hiding in Encrypted HDR Images. IEEE Access 2022, 10, 49347–49358. [Google Scholar] [CrossRef]
- Liu, J.-C.; Chang, C.-C.; Lin, C.-C. Hiding Information in a Well-Trained Vector Quantization Codebook. In Proceedings of the 2023 6th International Conference on Signal Processing and Machine Learning (SPML’23), Beijing, China, 17–19 October 2023; ACM: New York, NY, USA, 2023; pp. 287–292. [Google Scholar] [CrossRef]
- Baluja, S. Hiding Images in Plain Sight: Deep Steganography. In Advances in Neural Information Processing Systems 30 (NIPS 2017), Proceedings of the 31st Annual Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA 4-9 December 2017; Curran Associates, Inc.: Red Hook, NY, USA, 2017; pp. 2069–2079. [Google Scholar]
- Wang, Z.; Zhou, M.; Liu, B.; Li, T. Deep Image Steganography Using Transformer and Recursive Permutation. Entropy 2022, 24, 878. [Google Scholar] [CrossRef] [PubMed]
- Al-Shatari, M.; Hussin, F.A.; Aziz, A.A.; Eisa, T.A.E.; Tran, X.-T.; Dalam, M.E.E. IoT Edge Device Security: An Efficient Lightweight Authenticated Encryption Scheme Based on LED and PHOTON. Appl. Sci. 2023, 13, 10345. [Google Scholar] [CrossRef]
- Chang, C.-C.; Chang, J.-F.; Kao, W.-J.; Horng, J.-H. Two-Layer Reversible Data Hiding for VQ-Compressed Images Based on De-Clustering and Indicator-Free Search-Order Coding. Future Internet 2021, 13, 215. [Google Scholar] [CrossRef]













| Symbol | Description | Remarks |
|---|---|---|
| b | Embedding rate | Number of bits embedded per block |
| DC | Difference Codebook | Trained on difference maps |
| DM | Difference Map | Pixel-wise residual between I and Ivq |
| DMb | Difference block | A 4 × 4 block of the difference map |
| ED | Required embedding capacity | Minimum number of edge-marked blocks required |
| ED_bits | Expanded index bits | Total number of bits required to store expanded indices after embedding (Equation (8)) |
| I | Original image | Input grayscale test image of size M × N |
| i, i’ | Index and recoded index | Original DC index and its recoded index using the RIV mapping, i′ = 2b× i+ s_dec |
| IC | Image Codebook | Generated by LBG algorithm |
| Ivq | VQ-decompressed image | Obtained from VQ Index Table (VQ-IT) and IC |
| n | Codebook size | e.g., 64, 128, 256, 512, 1024 |
| PPR | Pure Payload Ratio | Efficiency metric, ratio of real secret bits to ED_Bits |
| QIC | Quality Improvement Codes | Codes that encode residual information to improve reconstruction while simultaneously carrying secret bits |
| r_s | Actual number of edge-marked blocks | Actual number of edge-marked blocks detected under Sobel threshold T |
| Real Secret Bits | Actual payload | Actual embedded secret bits = b × r_s (Equation (9)) |
| s, s_dec | Secret bits and decimal form | Secret bit segment (s ∈ {0, 1}b); s_dec is the decimal value of s |
| T | Sobel threshold | Threshold parameter in Sobel edge detection, determining the number of edge-marked blocks |
| VQ-IT | VQ Index Table | |
| ΔPSNR | PSNR gain | Difference vs. baseline VQ |
| ΔSSIM | SSIM gain | Difference vs. baseline VQ |
| IC/DC Size | Sobel Threshold | Edge-Marked Blocks | Real Secret Bits | ED_Bits | VQ PSNR (dB) | VQ SSIM (%) | PSNR of Proposed (dB) | SSIM of Proposed (%) | ΔPSNR | ΔSSIM |
|---|---|---|---|---|---|---|---|---|---|---|
| 64 | 10 | 15,107 | 90,642 | 181,284 | 33.12 | 86.50 | 37.44 | 94.43 | 4.32 | 7.93% |
| 30 | 14,321 | 85,926 | 171,852 | 33.12 | 86.50 | 37.35 | 94.30 | 4.23 | 7.79% | |
| 50 | 8667 | 52,002 | 104,004 | 33.12 | 86.50 | 36.36 | 91.85 | 3.25 | 5.35% | |
| 70 | 5927 | 35,562 | 71,124 | 33.12 | 86.50 | 35.75 | 90.44 | 2.64 | 3.94% | |
| 90 | 3319 | 19,914 | 39,828 | 33.12 | 86.50 | 34.93 | 88.77 | 1.82 | 2.26% | |
| 110 | 2637 | 15,822 | 31,644 | 33.12 | 86.50 | 34.66 | 88.29 | 1.54 | 1.79% | |
| 130 | 1680 | 10,080 | 20,160 | 33.12 | 86.50 | 34.20 | 87.61 | 1.08 | 1.10% | |
| 256 | 10 | 15,696 | 94,176 | 219,744 | 35.20 | 90.91 | 40.33 | 97.10 | 5.12 | 6.19% |
| 30 | 11,985 | 71,910 | 167,790 | 35.20 | 90.91 | 39.73 | 96.19 | 4.53 | 5.29% | |
| 50 | 7672 | 46,032 | 107,408 | 35.20 | 90.91 | 38.68 | 94.57 | 3.48 | 3.67% | |
| 70 | 4675 | 28,050 | 65,450 | 35.20 | 90.91 | 37.68 | 93.14 | 2.48 | 2.23% | |
| 90 | 2943 | 17,658 | 41,202 | 35.20 | 90.91 | 36.97 | 92.31 | 1.77 | 1.40% | |
| 110 | 1982 | 11,892 | 27,748 | 35.20 | 90.91 | 36.53 | 91.85 | 1.32 | 0.94% | |
| 130 | 1332 | 7992 | 18,648 | 35.20 | 90.91 | 36.19 | 91.54 | 0.99 | 0.64% | |
| 1024 | 10 | 16,082 | 96,492 | 257,312 | 37.23 | 94.10 | 42.62 | 98.23 | 5.39 | 4.12% |
| 30 | 11,324 | 67,944 | 181,184 | 37.23 | 94.10 | 41.84 | 97.42 | 4.61 | 3.32% | |
| 50 | 6388 | 38,328 | 102,208 | 37.23 | 94.10 | 40.49 | 96.13 | 3.26 | 2.03% | |
| 70 | 3776 | 22,656 | 60,416 | 37.23 | 94.10 | 39.59 | 95.37 | 2.36 | 1.27% | |
| 90 | 2653 | 15,918 | 42,448 | 37.23 | 94.10 | 39.09 | 95.01 | 1.86 | 0.90% | |
| 110 | 1820 | 10,920 | 29,120 | 37.23 | 94.10 | 38.66 | 94.74 | 1.43 | 0.63% | |
| 130 | 1255 | 7530 | 20,080 | 37.23 | 94.10 | 38.30 | 94.55 | 1.07 | 0.44% |
| IC/DC Size | Sobel Threshold | Edge-Marked Blocks | Real Secret Bits | ED_Bits | VQ PSNR (dB) | VQ SSIM (%) | PSNR of Proposed (dB) | SSIM of Proposed (%) | ΔPSNR | ΔSSIM |
|---|---|---|---|---|---|---|---|---|---|---|
| 64 | 10 | 3991 | 23,946 | 47,892 | 29.32 | 82.30 | 32.92 | 92.16 | 3.60 | 9.86% |
| 30 | 3896 | 23,376 | 46,752 | 29.32 | 82.30 | 32.88 | 92.04 | 3.57 | 9.74% | |
| 50 | 3254 | 19,524 | 39,048 | 29.32 | 82.30 | 32.65 | 90.95 | 3.34 | 8.65% | |
| 70 | 2753 | 16,518 | 33,036 | 29.32 | 82.30 | 32.41 | 89.91 | 3.10 | 7.61% | |
| 90 | 1924 | 11,544 | 23,088 | 29.32 | 82.30 | 31.86 | 87.81 | 2.54 | 5.51% | |
| 110 | 1634 | 9804 | 19,608 | 29.32 | 82.30 | 31.60 | 87.01 | 2.29 | 4.71% | |
| 130 | 1141 | 6846 | 13,692 | 29.32 | 82.30 | 31.06 | 85.49 | 1.74 | 3.20% | |
| 256 | 10 | 4038 | 24,228 | 56,532 | 30.98 | 87.50 | 35.02 | 95.03 | 4.04 | 7.53% |
| 30 | 3680 | 22,080 | 51,520 | 30.98 | 87.50 | 34.92 | 94.64 | 3.94 | 7.14% | |
| 50 | 3047 | 18,282 | 42,658 | 30.98 | 87.50 | 34.64 | 93.71 | 3.66 | 6.21% | |
| 70 | 2406 | 14,436 | 33,684 | 30.98 | 87.50 | 34.23 | 92.53 | 3.25 | 5.03% | |
| 90 | 1749 | 10,494 | 24,486 | 30.98 | 87.50 | 33.68 | 91.26 | 2.70 | 3.76% | |
| 110 | 1282 | 7692 | 17,948 | 30.98 | 87.50 | 33.24 | 90.38 | 2.26 | 2.88% | |
| 130 | 981 | 5886 | 13,734 | 30.98 | 87.50 | 32.88 | 89.74 | 1.90 | 2.24% | |
| 1024 | 10 | 4079 | 24,474 | 65,264 | 32.43 | 91.20 | 36.57 | 96.53 | 4.14 | 5.32% |
| 30 | 3614 | 21,684 | 57,824 | 32.43 | 91.20 | 36.48 | 96.21 | 4.04 | 5.01% | |
| 50 | 2909 | 17,454 | 46,544 | 32.43 | 91.20 | 36.18 | 95.48 | 3.75 | 4.27% | |
| 70 | 2135 | 12,810 | 34,160 | 32.43 | 91.20 | 35.71 | 94.58 | 3.28 | 3.38% | |
| 90 | 1575 | 9450 | 25,200 | 32.43 | 91.20 | 35.25 | 93.85 | 2.81 | 2.64% | |
| 110 | 1203 | 7218 | 19,248 | 32.43 | 91.20 | 34.85 | 93.31 | 2.42 | 2.10% | |
| 130 | 935 | 5610 | 14,960 | 32.43 | 91.20 | 34.52 | 92.93 | 2.09 | 1.72% |
| Images | Metrics | Wang & Lu (2009) [16] | Chang et al. (2021) [41] | Zhao et al. (2014) [2] | Our Proposed |
|---|---|---|---|---|---|
| LENA | PSNR (dB) | 31.22 | 30.66 | 32.26 | 33.88 |
| Payload/EC (bits) | 32,004 | 63,299 | 64,008 | 90,258 | |
| Baboon | PSNR | 23.89 | 25.59 | 24.73 | 27.82 |
| Payload/EC (bits) | 47,250 | 47,069 | 64,008 | 98,010 | |
| Pepper | PSNR | 30.56 | 30.49 | 31.74 | 35.47 |
| Payload/EC (bits) | 47,250 | 68,412 | 64,008 | 91,350 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yeh, C.-H.; Kuo, C.-W.; Lin, X.-Z.; Shen, W.-C.; Liao, C.-W. Simultaneous Reversible Data Hiding and Quality Enhancement for VQ-Compressed Images via Quality Improvement Codes. Electronics 2025, 14, 4463. https://doi.org/10.3390/electronics14224463
Yeh C-H, Kuo C-W, Lin X-Z, Shen W-C, Liao C-W. Simultaneous Reversible Data Hiding and Quality Enhancement for VQ-Compressed Images via Quality Improvement Codes. Electronics. 2025; 14(22):4463. https://doi.org/10.3390/electronics14224463
Chicago/Turabian StyleYeh, Chun-Hsiu, Chung-Wei Kuo, Xian-Zhong Lin, Wei-Cheng Shen, and Chin-Wei Liao. 2025. "Simultaneous Reversible Data Hiding and Quality Enhancement for VQ-Compressed Images via Quality Improvement Codes" Electronics 14, no. 22: 4463. https://doi.org/10.3390/electronics14224463
APA StyleYeh, C.-H., Kuo, C.-W., Lin, X.-Z., Shen, W.-C., & Liao, C.-W. (2025). Simultaneous Reversible Data Hiding and Quality Enhancement for VQ-Compressed Images via Quality Improvement Codes. Electronics, 14(22), 4463. https://doi.org/10.3390/electronics14224463

