Skip to main content

A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping

  • Conference paper
  • First Online:
  • 1360 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10039))

Abstract

As the most efficient matrix embedding scheme, syndrome-trellis codes (STCs) has been widely used in the field of data hiding, it is implemented based on syndrome trellis structure of convolutional codes and the Viterbi algorithm. In this paper, a new construction scheme of STCs is proposed based on a family of time-varying periodic convolutional codes, the parity-check matrix is constructed by matrix unwarpping. The proposed scheme can enhance the parameter recognition of STCs efficiently while maintaining similar performance with STCs. Moreover, their construction method is more systematic.

W. Liu—This study was supported by NSF of Jiangsu province (Grant nos. BK20160840, BK20150472), and NSF of China (Grant nos. 61272421, 61472188) and A Project Funded by the Priority Academic Program Development of Jiangsu Higer Education Institutions (PAPD), and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1947–1962 (2016)

    Article  Google Scholar 

  2. Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)

    Article  Google Scholar 

  3. Han, T., Fei, J., Liu, S., Chen, X., Zhu, Y.: High-payload image-hiding scheme based on best-block matching and multi-layered syndrome-trellis codes. In: Benatallah, B., Bestavros, A., Manolopoulos, Y., Vakali, A., Zhang, Y. (eds.) WISE 2014, Part II. LNCS, vol. 8787, pp. 336–350. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  4. Xiaoyuan, Y., Duntao, G., Jun, L.: An image steganography based on multi-layered syndrome-trellis codes in DWT domain. In: 2013 32nd Chinese Control Conference (CCC), pp. 3738–3743 (2013)

    Google Scholar 

  5. Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234–239 (2012)

    Google Scholar 

  6. Sedighi, V., Fridrich, J., Cogranne, R.: Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model. In: IS&T/SPIE Electronic Imaging, pp. 94090H–94090H-13 (2015)

    Google Scholar 

  7. Luo, X., Song, X., Li, X., Zhang, W., Lu, J., Yang, C., et al.: Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimedia Tools Appl. 1–27 (2015)

    Google Scholar 

  8. Liu, W., Liu, G., Dai, Y.: On recovery of the stego-key in syndrome-trellis codes. ICIC Express Lett. 8(10), 2901–2906 (2014)

    Google Scholar 

  9. Palazzo Jr., R.: A time-varying convolutional encoder better than the best time-invariant encoder. IEEE Trans. Inf. Theor. 39(3), 1109–1110 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  10. Lee, P.J.: There are many good periodically time-varying convolutional codes. IEEE Trans. Inf. Theor. 35(2), 460–463 (1989)

    Article  MathSciNet  Google Scholar 

  11. Mu, L., Liu, X., Liang, C.: Construction of binary LDPC convolutional codes based on finite fields. IEEE Commun. Lett. 16(6), 897–900 (2012)

    Article  Google Scholar 

  12. Pusane, A.E., Smarandache, R., Vontobel, P.O., Costello, D.J.: Deriving good LDPC convolutional codes from LDPC block codes. IEEE Trans. Inf. Theor. 57(2), 835–857 (2011)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weiwei Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Liu, W., Liu, G., Zhai, J., Dai, Y. (2016). A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48671-0_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48670-3

  • Online ISBN: 978-3-319-48671-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics