A Robust Steganography Structure Using a Nested Linear Code

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 293)

Abstract

Matrix embedding is a high performance technique for steganography. In the paper, we present one new approaches to matrix embedding based on a convolutional code binary nested embedding scheme. This scheme offers a practical method to realization of embedding algorithm and minimizes the average modified distortion by use of Viterbi quantizer between stego and host object. The novel algorithm performs an embedding procedure through a trellis structure based on generator matrix. Systematic convolutional code and nested structure are adopted to achieve realization of embedding algorithm. In this work, the coding technique proposed is validated as a simple and efficient algorithm.

Keywords

Data hiding Informed coding Informed embedding Robustness 

Notes

Acknowledgments

This study is supported in part by the National Science Council of the Republic of China under contract numbers NSC-101-2221-E-167-026 and NSC-102-2221-E-167-001.

References

  1. 1.
    Moulin, P., & Koetter, R. (2005). Data-hiding codes. In Proceedings of IEEE (vol. 93, no. 12, pp. 2083–2126). December 2005.Google Scholar
  2. 2.
    Wainwright, M. J. (2007). Sparse graph codes for side information and binning. IEEE Signal Processing Magazine, 24(5), 47–57.CrossRefMathSciNetGoogle Scholar
  3. 3.
    Crandall, R. (1998). Some notes on steganography. Steganography mailing list, available from http://os.inf.tu-dresden.de/westfeld/crandall.pdf
  4. 4.
    Bierbrauer, J. (1998). On Crandall’s problem. Available from http://www.ws.binghamton.edu/fridrich/covcodes.pdf
  5. 5.
    Galand, F. & Kabatiansky, G. (2003). Information hiding by coverings. In Proceedings ITW2003 (pp. 151–154). Paris, France.Google Scholar
  6. 6.
    Fridrich, J., & Soukal, D. (2006). Matrix embedding for large payloads. IEEE Trans. Information Forensics and Security, 1, 390–395.CrossRefGoogle Scholar
  7. 7.
    Costa, M. H. M. (1993). Writing on dirty paper. IEEE Transactions on Information Theory, 29, 439--441.Google Scholar
  8. 8.
    Miller, M. L., Doёrr, G. J., & Cox, I. J. (2004). Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Transactions on Image Processing, 13, (6), 792--807.Google Scholar
  9. 9.
    Cox, I. J., Miller, M. L., & McKellips, A. (1999). Watermarking as communications with side information. Proceedings of the IEEE, 87, 1127--1141. Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringNational Chin-Yi University of TechnologyTaichung 411Taiwan, Republic of China

Personalised recommendations