An optimized data hiding scheme for Deflate codes
Compression file is a common form of carriers in network data transmission; therefore, it is essential to investigate the data hiding schemes for compression files. The existing data hiding schemes embed secret bits by shrinking the length of symbols, while they are not secure enough since the shrinking of symbol length is easily detected. First, we propose a longest match detecting algorithm that can detect the data hiding behavior of shrinking the length of symbols, by checking whether items of the generated dictionary are longest matches or not. Then, we propose a secret data hiding scheme based on Deflate codes, which reversibly embeds secret data by altering the matching process, to choose the proper matching result that the least significant bit of length field in [distance, length] pair is equal to the current embedded secret bit. The proposed data hiding scheme can resist on the longest match detection, and the embedding rate is higher than DH-LZW algorithm. The experiment shows that the proposed scheme achieves 5.12% of embedding rate and 10.18% size increase in the compressed file. Moreover, an optimization is made in providing practical suggestion for DH-Deflate data hiding. One can choose which format and size of files are to be selected based upon the optimization, and thus, data hiding work can be achieved in a convenient and targeted way.
KeywordsSteganography Information hiding Deflate coding algorithm Optimization
This research was supported by the National Natural Science Foundation of China (Nos. U1636213, 61370063, 61379048, 61672508).
Compliance with ethical standards
Conflict of interest
The authors declare that they have no conflict of interest.
- Chen C-C, Chang C-C (2010) High-capacity reversible data-hiding for lzw codes. In: Computer modeling and simulation, 2010. ICCMS’10. Second international conference on, vol 1. IEEE, pp 3–8Google Scholar
- Kumar A, Pooja K (2010) Steganography-a data hiding technique. Int J Comput Appl 9(7):19–23Google Scholar
- Lonardi S, Szpankowski W (2003) Joint source-channel lz’77 coding. In: Data compression conference, 2003. Proceedings. DCC 2003. IEEE, pp 273–282Google Scholar
- Moon SK, Kawitkar RS (2007) Data security using data hiding. In: Conference on computational intelligence and multimedia applications, 2007. International conference on, vol 4. IEEE, pp 247–251Google Scholar
- Ruijin ZHU, Tan Y, Zhang Q, Fei WU, Zheng J, Yuan XUE (2016) Determining image base of firmware files for arm devices. IEICE Trans Inf Syst E99.D(2):351–359Google Scholar
- Shim Hiuk Jae, Ahn Jinhaeng, Jeon Byeungwoo (2004) Dh-lzw: lossless data hiding in lzw compression. In: Image processing, 2004. ICIP’04. 2004 International conference on, vol 4. IEEE, pp 2195–2198Google Scholar
- Wu Y, Lonardi S, Szpankowski W (2006) Error-resilient lzw data compression. In: Data compression conference (DCC’06). IEEE, pp 193–202Google Scholar
- Xuan G, Shi YQ, Ni ZC, Chen J, Yang C, Zhen Y, Zheng J (2004) High capacity lossless data hiding based on integer wavelet transform. In: Circuits and systems, 2004. ISCAS’04. Proceedings of the 2004 international symposium on, vol 2. IEEE, pp II–29Google Scholar
- Xuan G, Shi YQ, Yang C, Zheng Y, Zou D, Chai P (2005) Lossless data hiding using integer wavelet transform and threshold embedding technique. In: 2005 IEEE international conference on multimedia and expo. IEEE, pp 1520–1523Google Scholar
- Yadav D, Singhal V, Bandil DK (2012) Reversible data hiding techniques. Int J Electron Comput Sci Eng 1(2):380–383Google Scholar
- Zhang X, Tan Y, Xue Y, Zhang Q, Li Y, Zhang C, Zheng J (2017) Cryptographic key protection against frost for mobile devices. Clust Comput 1–10. doi: 10.1007/s10586-016-0721-3