Abstract
Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipient. In this paper, we describe new approaches to wet paper codes that enjoy low computational complexity and improved embedding efficiency (number of message bits per embedding change). Some applications of wet paper codes to steganography and data embedding in binary images are discussed.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Anderson, R.J., Petitcolas, F.A.P.: On the Limits of Steganography. IEEE Journal of Selected Areas in Communications. Special Issue on Copyright and Privacy Protection 16(4), 474–481 (1998)
Westfeld, A.: High Capacity Despite Better Steganalysis (F5–A Steganographic Algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Karahan, M., Topkara, U., Atallah, M., Taskiran, C., Lin, E., Delp, E.: A Hierarchical Protocol for Increasing the Stealthiness of Steganographic Methods. In: Proc. ACM Multimedia and Security Workshop, Magdeburg, Germany, pp. 16–24 (2004)
Westfeld, A., Böhme, R.: Exploiting Preserved Statistics for Steganalysis. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)
Fridrich, J., Goljan, M., Soukal, D.: Perturbed Quantization Steganography with Wet Paper Codes. In: Proc. ACM Multimedia and Security Workshop. Magdeburg Germany, pp. 4–15 (2004)
Fridrich, J., Goljan, M., Lisoněk, P., Soukal, D.: Writing on Wet Paper. (Journal version) To appear in IEEE Trans. on Sig. Proc. Special Issue on Media Security (2005)
Fridrich, J., Goljan, M., Lisoněk, P., Soukal, D.: Writing on Wet Paper. In: Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, pp. 328–340 (2005)
Kuznetsov, A.V., Tsybakov, B.S.: Coding in a Memory with Defective Cells. Probl. Inform. Transmission 10, 132–138 (1974)
Gelfand, S.I., Pinsker, M.S.: Coding for Channel with Random Parameters. Probl. Pered. Inform. (Probl. Inform. Transm.) 9(1), 19–31 (1980)
Zamir, R., Shamai, S., Erez, U.: Nested Linear/Lattice Codes for Structured Multiterminal Binning. IEEE Trans. Inf. Th. 48(6), 1250–1276 (2002)
Heegard, C.: Partitioned Linear Block Codes for Computer Memory with ‘Stuck-at’ Defects. IEEE Trans. Inf. Th. 29, 831–842 (1983)
Heegard, C., El-Gamal, A.: On the Capacity of Computer Memory with Defects. IEEE Trans. Inf. Th. 29, 731–739 (1983)
Luby, M.: LT Codes. In: Proc. The 43rd Annual IEEE Symposium on Foundations of Computer Science, pp. 271–282 (2002)
Brent, R.P., Gao, S., Lauder, A.G.B.: Random Krylov Spaces Over Finite Fields. SIAM J. Discrete Math. 16(2), 276–287 (2003)
Crandall, R.: Some Notes on Steganography. In: Posted on Steganography Mailing List (1998), http://os.inf.tu-dresden.de/~westfeld/crandall.pdf
Galand, F., Kabatiansky, G.: Information Hiding by Coverings. In: Proc. ITW 2003, Paris France, pp. 151–154 (2003)
Fridrich, J., Goljan, M., Soukal, D., Holotyak, T.: Forensic Steganalysis: Determining the Stego Key in Spatial Domain Steganography. In: Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, pp. 631–642 (2005)
Wu, M., Tang, E., Liu, B.: Data Hiding in Digital Binary Image. In: Proc. Conf. on Multimedia & Expo., New York (2000) (CD version)
Wu, M., Fridrich, J., Goljan, M., Gou, H.: Data Hiding in Digital Binary Images: A Revisit. In: Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII. San Jose, pp. 194–205 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fridrich, J., Goljan, M., Soukal, D. (2005). Efficient Wet Paper Codes. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_16
Download citation
DOI: https://doi.org/10.1007/11558859_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29039-1
Online ISBN: 978-3-540-31481-3
eBook Packages: Computer ScienceComputer Science (R0)