Relationship between Correcting Code and Module Technique in Hiding Secret Data

  • Phan Trung Huy
  • Nguyen Hai Thanh
  • Cheonsick Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7513)

Abstract

In this paper, we show the role of modules over rings of finite characteristics in data hiding area. Applications of correcting codes and covering functions in data hiding are shown as special cases of our module approach. Applications of modules over rings of characteristic 2 to design new embedding schemes for hiding secret data in binary images are introduced.

Keywords

module ring characteristic 2 data hiding binary image steganography correcting codes covering function MSDR 

References

  1. 1.
    Bierbrauer, J.: Crandall’s problem (1998) (unpublished), http://www.ws.binghamton.edu/fridrich/covcodes.pdf
  2. 2.
    Chang, C.C., Kieu, T.D., Chou, Y.C.: A High Payload Steganographic Scheme based on (7,4) Hamming Code for Digital Images. In: Electronic Commerce and Security 2008 Symposium, pp. 16–21 (2008)Google Scholar
  3. 3.
    Chen, Y., Pan, H., Tseng, Y.: A secure of data hiding scheme for two-color images. In: IEEE Symposium on Computers and Communications (2000)Google Scholar
  4. 4.
    Kim, C., Shin, D., Shin, D.: Data Hiding in a Halftone Image Using Hamming Code (15, 11). In: Nguyen, N.T., Kim, C.-G., Janiak, A. (eds.) ACIIDS 2011, Part II. LNCS, vol. 6592, pp. 372–381. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  5. 5.
    Crandall, R.: Some notes on steganography. Posted on steganography mailing list (1998), http://os.inf.tu-dresden.de/_westfeld/crandall.pdf
  6. 6.
    Galand, Kabatiansky, G.: Information hiding by coverings. In: Proceedings of the IEEE Information Theory Workshop, pp. 151–154 (2004)Google Scholar
  7. 7.
    Bierbrauer, J., Fridrich, J.: Constructing Good Covering Codes for Applications in Steganography. In: Shi, Y.Q. (ed.) Transactions on DHMS III. LNCS, vol. 4920, pp. 1–22. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  8. 8.
    Lee, C.F., Chen, H.L.: A novel data hiding scheme based on modulus function. The Journal of Systems and Software 83, 832–843 (2010)CrossRefGoogle Scholar
  9. 9.
    Ould Medeni, M.B., Souidi, E.M.: A Novel Steganographic Protocol from Error-correcting Codes. Journal of Information Hiding and Multimedia Signal Processing 1(4) (October 2010) ISSN 2073-4212Google Scholar
  10. 10.
    Nordstrom, A.W., Robinson, J.P.: An optimum nonlinear code. Information and Control 11, 613–616 (1967)MATHCrossRefGoogle Scholar
  11. 11.
    Phan, T.H., Nguyen, H.T.: On the Maximality of Secret Data Ratio in CPTE Schemes. In: Nguyen, N.T., Kim, C.-G., Janiak, A. (eds.) ACIIDS 2011, Part I. LNCS (LNAI), vol. 6591, pp. 88–99. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  12. 12.
    Preparata, F.P.: A class of optimum nonlinear double-error-correcting codes. Information and Control 13, 378–400 (1968)MathSciNetMATHCrossRefGoogle Scholar
  13. 13.
    Struik, R.: Covering Codes. Ph.D. dissertation, Eindhoven (1994)Google Scholar
  14. 14.
    Zhang, W., Zhang, X., Wang, S.: Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 60–71. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  15. 15.
    Westfeld, A.: F5–A Steganographic Algorithm High Capacity Despite Better Steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  16. 16.
    Wu, M.Y., Lee, J.H.: Anovel data embedding method for two-color fascimile images. In: Proceedings of International Symposium on Multimedia Information Processing. Chung-Li, Taiwan, R.O.C (1998)Google Scholar
  17. 17.
    Zhang, X., Wang, S.: Analysis of Parity Assignment Steganography in Palette Images. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1025–1031. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  18. 18.
    Zhang, X., Wang, S.: Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognition Letters 25, 331–339 (2004)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Phan Trung Huy
    • 1
  • Nguyen Hai Thanh
    • 2
  • Cheonsick Kim
    • 3
  1. 1.Hanoi University of Science and TechnologyHanoiVietnam
  2. 2.Ministry of Education and TrainingHanoiVietnam
  3. 3.Dept. of Computer EngineeringSejong UniversitySeoulKorea

Personalised recommendations