Skip to main content

Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes

  • Conference paper
Information Hiding (IH 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5284))

Included in the following conference series:

Abstract

For good security and large payload in steganography, it is desired to embed as many messages as possible per change of the cover-object, i.e., to have high embedding efficiency. Steganographic codes derived from covering codes can improve embedding efficiency. In this paper, we propose a new method to construct stego-codes, showing that not just one but a family of stego-codes can be generated from one covering code by combining Hamming codes and wet paper codes. This method can enormously expand the set of embedding schemes as applied in steganography. Performances of stego-code families of structured codes and random codes are analyzed. By using the stego-code families of LDGM codes, we obtain a family of near optimal embedding schemes for binary steganography and ±1 steganography, respectively, which can approach the upper bound of embedding efficiency for various chosen embedding rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Crandall, R.: Some notes on steganography. Posted on steganography mailing list (1998), http://os.inf.tu-dresden.de/westfeld/crandall.pdf

  2. Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Proceedings of the IEEE Information Theory Workshop 2004, pp. 151–154 (2004)

    Google Scholar 

  3. Bierbrauer, J., Fridrich, J.: Constructing good covering codes for applications in steganography. In: Transactions on Data Hiding and Multimedia Security. LNCS. Springer, Heidelberg (to appear, 2007), http://www.math.mtu.edu/jbierbra/

    Google Scholar 

  4. Tseng, Y.C., Chen, Y.-Y., Pan, H.-K.: A secure data hiding scheme for binary images. IEEE Transactions on Communications 50(8), 1227–1231 (2002)

    Article  Google Scholar 

  5. Schönfeld, D., Winkler, A.: Embedding with syndrome coding based on BCH codes. In: Proc. ACM the 8th workshop on Multimedia and Security, pp. 214–223 (2006)

    Google Scholar 

  6. Munuera, C.: Steganography and error-correcting codes. Signal Processing 87, 1528–1533 (2007)

    Article  MATH  Google Scholar 

  7. Fridrich, J., Soukal, D.: Matrix embedding for large payloads. IEEE Transactions on Information Security and Forensics 1(3), 390–394 (2006)

    Article  Google Scholar 

  8. Fridrich, J., Filler, T.: Practical methods for minimizing embedding impact in steganography. In: Proc. SPIE Electronic Imaging, vol. 6050 (2007)

    Google Scholar 

  9. Willems, F., Dijk, M.: Capacity and codes for embedding information in gray-scale signals. IEEE Transactions on Information Theory 51(3), 1209–1214 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  10. Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Communications Letters 10(11), 781–783 (2006)

    Article  Google Scholar 

  11. Fridrich, J., Lisoněk, P.: Grid coloring in steganography. IEEE Transactions on Information Theory 53(4), 1547–1549 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  12. Mielikainen, J.: LSB matching revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)

    Article  Google Scholar 

  13. Zhang, W., Wang, S., Zhang, X.: Improving embedding efficiency of covering codes for applications in steganography. IEEE Communications Letters 11(8), 680–682 (2007)

    Article  Google Scholar 

  14. Zhang, W., Zhang, X., Wang, S.: A double layered “plus-minus one” data embedding scheme. IEEE Signal Processing Letters 14(11), 848–851 (2007)

    Article  Google Scholar 

  15. Fridrich, J., Goljan, M., Lisonek, P., Soukal, D.: Writing on wet paper. IEEE Transactions on Signal Processing 53(10), 3923–3935 (2005)

    Article  MathSciNet  Google Scholar 

  16. Ker, A.D.: A General Framework for the Structural Steganalysis of LSB Replacement. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 296–311. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Zhang, W., Li, S.: A coding problem in steganography. Designs, Codes and Cryptography 46, 67–81 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  18. Barron, R.J., Chen, B., Wornell, G.W.: The duality between information embedding and source coding with side information and some applications. IEEE Transactions on Information Theory 49(5), 1159–1180 (2003)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, W., Zhang, X., Wang, S. (2008). Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. In: Solanki, K., Sullivan, K., Madhow, U. (eds) Information Hiding. IH 2008. Lecture Notes in Computer Science, vol 5284. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88961-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88961-8_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88960-1

  • Online ISBN: 978-3-540-88961-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics