Skip to main content

Robust Syndrome-Trellis Codes for Fault-Tolerant Steganography

  • Conference paper
  • First Online:
Security with Intelligent Computing and Big-Data Services 2019 (SICBS 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1145))

Abstract

Syndrome-Trellis Codes (STCs) have been widely used in adaptive steganography due to their high embedding efficiency. However, this type of steganographic codes is sensitive to stego damage, which may be incurred by compression, channel noise, active attacks, and so on, in practical covert communication. In this paper, a construction of robust STCs is proposed to achieve a good balance between robustness and embedding efficiency. The encoder of the proposed scheme performs a specified Error Correction Code (ECC) on the STC’s intermediate outputs. Further, a Viterbi algorithm is suggested to effectively find the optimum stego vector. At the extraction phase, the received stego vector is first decoded by the decoder of the employed ECC and then sent to the STC decoder, which gives the extracted message bits. Experimental results show the proposed scheme presents a good robustness performance, meanwhile the stego remains an acceptable detection resistance against steganalyzers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Filler, T., Judas, J., Fridrich, J.J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)

    Article  Google Scholar 

  2. Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 4206–4210 (2014)

    Google Scholar 

  3. Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221–234 (2016)

    Article  Google Scholar 

  4. Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, pp. 59–68 (2013)

    Google Scholar 

  5. Su, W., Ni, J., Li, X., Shi, Y.Q.: A new distortion function design for JPEG steganography using the generalized uniform embedding strategy. IEEE Trans. Circuits Syst. Video Technol. 28(12), 3545–3549 (2018)

    Article  Google Scholar 

  6. Zhang, Y., Luo, X., Yang, C., Ye, D., Liu, F.: A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients. In: 2015 10th International Conference on Availability, Reliability and Security (ARES), pp. 461–466 (2015)

    Google Scholar 

  7. Zhang, Y., Luo, X., Yang, C., Liu, F.: Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection. Multimedia Tools Appl. 76(3), 3649–3668 (2017)

    Article  Google Scholar 

  8. Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet, S., Pun, T.: Second generation benchmarking and application oriented evaluation. In: Information Hiding, pp. 340–353 (2001)

    Google Scholar 

  9. Liu, W., Liu, G., Dai, Y.: Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency. Secur. Commun. Netw. 8(9), 1636–1647 (2015)

    Article  Google Scholar 

  10. Zhang, X., Wang, S.: Stego-encoding with error correction capability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88(12), 3663–3667 (2005)

    Article  Google Scholar 

  11. Kin-Cleaves, C., Ker, A.D.: Adaptive steganography in the noisy channel with dual-syndrome trellis codes. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–7 (2018)

    Google Scholar 

  12. Larsen, K.: Short convolutional codes with maximal free distance for rates 1/2, 1/3, and 1/4 (corresp.). IEEE Trans. Inf. Theory 19(3), 371–372 (1973)

    Article  Google Scholar 

  13. Bocharova, I.E., Hug, F., Johannesson, R., Kudryashov, B.D.: On the exact bit error probability for Viterbi decoding of convolutional codes. In: Information Theory and Applications Workshop, pp. 1–6 (2011)

    Google Scholar 

  14. Bas, P., Filler, T., Pevnỳ, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: International Workshop on Information Hiding, pp. 59–70 (2011)

    Google Scholar 

  15. Kodovskỳ, J., Fridrich, J.: Calibration revisited. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, pp. 63–74 (2009)

    Google Scholar 

  16. Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 27 (2011)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Key R&D Program of Guangdong Province (Grant No. 2019B010136003), National Key R&D Program of China (Grant No. 2017YFB0802200), National Natural Science Foundation of China (Grant No. 61802145), Natural Science Foundation of Guangdong Province, China (Grant No. 2017A-030313390, 2018A030313387), Science and Technology Program of Guangzhou, China (Grant No. 201804010428), the Fundamental Research Funds for the Central Universities, the Opening Project of State Key Laboratory of Information Security, the Opening Project of Guangdong Provincial Key Laboratory of Information Security Technology (Grant No. 2017B030314131), the Opening Project of Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuchun Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Feng, B., Liu, Z., Wu, X., Lin, Y. (2020). Robust Syndrome-Trellis Codes for Fault-Tolerant Steganography. In: Jain, L., Peng, SL., Wang, SJ. (eds) Security with Intelligent Computing and Big-Data Services 2019. SICBS 2019. Advances in Intelligent Systems and Computing, vol 1145. Springer, Cham. https://doi.org/10.1007/978-3-030-46828-6_11

Download citation

Publish with us

Policies and ethics