Abstract
Syndrome-Trellis Codes (STCs) have been widely used in adaptive steganography due to their high embedding efficiency. However, this type of steganographic codes is sensitive to stego damage, which may be incurred by compression, channel noise, active attacks, and so on, in practical covert communication. In this paper, a construction of robust STCs is proposed to achieve a good balance between robustness and embedding efficiency. The encoder of the proposed scheme performs a specified Error Correction Code (ECC) on the STC’s intermediate outputs. Further, a Viterbi algorithm is suggested to effectively find the optimum stego vector. At the extraction phase, the received stego vector is first decoded by the decoder of the employed ECC and then sent to the STC decoder, which gives the extracted message bits. Experimental results show the proposed scheme presents a good robustness performance, meanwhile the stego remains an acceptable detection resistance against steganalyzers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Filler, T., Judas, J., Fridrich, J.J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)
Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 4206–4210 (2014)
Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221–234 (2016)
Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, pp. 59–68 (2013)
Su, W., Ni, J., Li, X., Shi, Y.Q.: A new distortion function design for JPEG steganography using the generalized uniform embedding strategy. IEEE Trans. Circuits Syst. Video Technol. 28(12), 3545–3549 (2018)
Zhang, Y., Luo, X., Yang, C., Ye, D., Liu, F.: A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients. In: 2015 10th International Conference on Availability, Reliability and Security (ARES), pp. 461–466 (2015)
Zhang, Y., Luo, X., Yang, C., Liu, F.: Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection. Multimedia Tools Appl. 76(3), 3649–3668 (2017)
Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet, S., Pun, T.: Second generation benchmarking and application oriented evaluation. In: Information Hiding, pp. 340–353 (2001)
Liu, W., Liu, G., Dai, Y.: Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency. Secur. Commun. Netw. 8(9), 1636–1647 (2015)
Zhang, X., Wang, S.: Stego-encoding with error correction capability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88(12), 3663–3667 (2005)
Kin-Cleaves, C., Ker, A.D.: Adaptive steganography in the noisy channel with dual-syndrome trellis codes. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–7 (2018)
Larsen, K.: Short convolutional codes with maximal free distance for rates 1/2, 1/3, and 1/4 (corresp.). IEEE Trans. Inf. Theory 19(3), 371–372 (1973)
Bocharova, I.E., Hug, F., Johannesson, R., Kudryashov, B.D.: On the exact bit error probability for Viterbi decoding of convolutional codes. In: Information Theory and Applications Workshop, pp. 1–6 (2011)
Bas, P., Filler, T., Pevnỳ, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: International Workshop on Information Hiding, pp. 59–70 (2011)
Kodovskỳ, J., Fridrich, J.: Calibration revisited. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 63–74 (2009)
Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 27 (2011)
Acknowledgements
This work was supported by the Key R&D Program of Guangdong Province (Grant No. 2019B010136003), National Key R&D Program of China (Grant No. 2017YFB0802200), National Natural Science Foundation of China (Grant No. 61802145), Natural Science Foundation of Guangdong Province, China (Grant No. 2017A-030313390, 2018A030313387), Science and Technology Program of Guangzhou, China (Grant No. 201804010428), the Fundamental Research Funds for the Central Universities, the Opening Project of State Key Laboratory of Information Security, the Opening Project of Guangdong Provincial Key Laboratory of Information Security Technology (Grant No. 2017B030314131), the Opening Project of Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Feng, B., Liu, Z., Wu, X., Lin, Y. (2020). Robust Syndrome-Trellis Codes for Fault-Tolerant Steganography. In: Jain, L., Peng, SL., Wang, SJ. (eds) Security with Intelligent Computing and Big-Data Services 2019. SICBS 2019. Advances in Intelligent Systems and Computing, vol 1145. Springer, Cham. https://doi.org/10.1007/978-3-030-46828-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-46828-6_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-46827-9
Online ISBN: 978-3-030-46828-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)