Skip to main content

Steganography Based on Low Density Parity Check(LDPC)

  • Conference paper
Future Information Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 309))

  • 2168 Accesses

Abstract

We propose a data hiding scheme based on Low Density Parity Check(LDPC) codes. Our proposed theoretical point of view, the blind watermarking can be transmitted through a noisy channel. Matrix encoding proposed by Crandall can be used in steganographic data hiding methods. Our proposed “LDPC-DH (Data Hiding)” scheme has a slightly increasing embedding efficiency, and improves highly embedding rate. We therefore propose verifying the embedding rate during the embedding and extracting phase. Experimental results show that the reconstructed secret messages are the same as the original secret messages, and that the proposed scheme exhibits a good embedding rate compared to that of previous schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J., Petitcolas, F.A.P.: On the Limits of Steganography. IEEE Journal of Selected Areas in Communications 16(4), 474–481 (1998)

    Article  Google Scholar 

  2. Fridrich, J., Goljan, M.: Digital Image Steganography Using Stochastic Modulation. In: Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, California, vol. 5020, pp. 191–202 (2003)

    Google Scholar 

  3. Bierbrauer, J., Fridrich, J.: Constructing good covering codes for applications in steganography. In: Shi, Y.Q. (ed.) Transactions on DHMS III. LNCS, vol. 4920, pp. 1–22. Springer, Heidelberg (2008)

    Google Scholar 

  4. Crandall, R.: Some notes on steganography. Posted on steganography mailing list (1998), http://os.inf.tu-dresden.de/~westfeld/crandall.pdf

  5. Westfeld, A.: F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Zhang, W., Wang, S., Zhang, X.: Improving Embedding Efficiency of Covering Codes for Applications in Steganography. IEEE Communications Letters 11(8), 680–682 (2007)

    Article  Google Scholar 

  7. Tseng, Y.-C., Chen, Y.-Y., Pan, H.-K.: A secure data hiding scheme for binary images. IEEE Trans. Communication 50(80), 1227–1231 (2002)

    Article  Google Scholar 

  8. Schonfeld, D., Winkler, A.: Embedding with syndrome coding based on BCH codes. In: Proc. 8th ACM Workshop on Multimedia and Security, pp. 214–223 (2006)

    Google Scholar 

  9. Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Communications Letters, 781–783 (2006)

    Google Scholar 

  10. Mielikainen, J.: LSB matching revisited. IEEE Signal Processing Letter 13(5), 285–287 (2006)

    Article  Google Scholar 

  11. Willems, F., Dijk, M.: Capacity and codes for embedding information in gray-scale signals. IEEE Transition Information Theory 51(3), 1209–1214 (2005)

    Article  Google Scholar 

  12. Chang, C.C., Kieu, T.D., Chou, Y.C.: A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. In: Electronic Commerce and Security 2008 Symposium, pp. 16–21 (2008)

    Google Scholar 

  13. Chen, M., Wong, E.K., Memon, N., Adams, S.: Recent developments in document image water-marking and data hiding. In: Proceedings of the SPIE Conference. Multimedia Systems and Applications IV, vol. 4518, pp. 166–176 (August 2001)

    Google Scholar 

  14. Gallager, R.: Low-density parity-check codes. Ph.D. dissertation. Massachusetts Institute of Technology (1963)

    Google Scholar 

  15. Kim, C.: Data hiding by an improved exploiting modification direction. Multimedia Tools and Applications, 1–16 (2012), doi:10.1007/s11042-012-1114-0 (published online: May 15, 2012)

    Google Scholar 

  16. Kim, C., Yang, C.-N.: Watermark with DSA signature using predictive coding. Multimedia Tools and Applications, 1–15 (2013), doi:10.1007/s11042-013-1667-6 (published online: August 29, 2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheonshik Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, C., Yang, CN. (2014). Steganography Based on Low Density Parity Check(LDPC). In: Park, J., Pan, Y., Kim, CS., Yang, Y. (eds) Future Information Technology. Lecture Notes in Electrical Engineering, vol 309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55038-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-55038-6_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-55037-9

  • Online ISBN: 978-3-642-55038-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics