Abstract
We introduce a steganographic protocol based on linear error block codes. Our method is an extension of Westfeld’s F5 algorithm. It allows to grow embedding capacity by exploiting more bits from the cover, in such a way that the probability for each bit to be flipped is related to its influence on the image quality. For example least significant bits (LSB) are the most exposed to alteration. Moreover, linear error-block codes, as a generalization of linear error correcting codes, provide larger and better choices for the codes to use. The results show that with a good choice of parameters, the change rate can also be reduced for an acceptable image quality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Crandall, R.: Some Notes on Steganography. Posted on Steganography Mailing List (1998), http://os.inf.tu-dresden.de/~westfeld/crandall.pdf
Westfeld, A.: F5-A Steganographic Algorithm. In: IHW 2001: Proceedings of the 4th International Workshop on Information Hiding, pp. 289–302 (2001)
Feng, K., Xu, L., Hickernell, F.J.: Linear Error-Block Codes. Finite Fields Appl. 12, 638–652 (2006)
Ling, S., Özbüdak, F.: Constructions and Bounds on Linear Error-Block Codes. Designs, Codes and Cryptography 45, 297–316 (2007)
Dariti, R., Souidi, E.M.: New Families of Perfect Linear Error-Block Codes (submitted)
Dariti, R., Souidi, E.M.: Cyclicity and Decoding of Linear Error-Block Codes. Journal of Theoretical and Applied Information Technology 25(1), 39–42 (2011)
Udomkavanicha, P., Jitman, S.: Bounds and Modifications on Linear Error-block Codes. International Mathematical Forum 5(1), 35–50 (2010)
Bierbrauer, J., Fridrich, J.: Constructing Good Covering Codes for Applications in Steganography. Transactions on data hiding and multimedia security III 3, 1–22 (2008)
Munuera, C.: Steganography and Error Correcting Codes. Signal Process. 87, 1528–1533 (2007)
Zhang, W., Li, S.: A Coding Problem in Steganography. Designs, Codes and Cryptography 46(1), 67–81 (2008)
van Lint, J.H.: Introduction to Coding Theory, Graduate Texts in Mathematics, 3rd edn., vol. 86. Springer, Berlin (1999)
Liao, X., Wen, Q.: Embedding in Two Least Significant Bits with Wet Paper Coding. In: CSSE 2008: Proceedings of the 2008 International Conference on Computer Science and Software Engineering, pp. 555–558 (2008)
Zhang, X., Zhang, W., Wang, S.: Efficient Double-Layered Steganographic Embedding. Electronics letters 43, 482 (2007)
Zhang, W., Zhang, X., Wang, S.: A Double Layered ”Plus-Minus One” Data Embedding Scheme. IEEE Signal Process. Lett. 14(11), 848–851 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dariti, R., Mamoun Souidi, E. (2011). Improving Code-Based Steganography with Linear Error-Block Codes. In: Snasel, V., Platos, J., El-Qawasmeh, E. (eds) Digital Information Processing and Communications. ICDIPC 2011. Communications in Computer and Information Science, vol 189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22410-2_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-22410-2_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22409-6
Online ISBN: 978-3-642-22410-2
eBook Packages: Computer ScienceComputer Science (R0)