Abstract
For good security and large payload in steganography, it is desired to embed as many messages as possible per change of the cover-object, i.e., to have high embedding efficiency. Steganographic codes derived from covering codes can improve embedding efficiency. In this paper, we propose a new method to construct stego-codes, showing that not just one but a family of stego-codes can be generated from one covering code by combining Hamming codes and wet paper codes. This method can enormously expand the set of embedding schemes as applied in steganography. Performances of stego-code families of structured codes and random codes are analyzed. By using the stego-code families of LDGM codes, we obtain a family of near optimal embedding schemes for binary steganography and ±1 steganography, respectively, which can approach the upper bound of embedding efficiency for various chosen embedding rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Crandall, R.: Some notes on steganography. Posted on steganography mailing list (1998), http://os.inf.tu-dresden.de/westfeld/crandall.pdf
Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Proceedings of the IEEE Information Theory Workshop 2004, pp. 151–154 (2004)
Bierbrauer, J., Fridrich, J.: Constructing good covering codes for applications in steganography. In: Transactions on Data Hiding and Multimedia Security. LNCS. Springer, Heidelberg (to appear, 2007), http://www.math.mtu.edu/jbierbra/
Tseng, Y.C., Chen, Y.-Y., Pan, H.-K.: A secure data hiding scheme for binary images. IEEE Transactions on Communications 50(8), 1227–1231 (2002)
Schönfeld, D., Winkler, A.: Embedding with syndrome coding based on BCH codes. In: Proc. ACM the 8th workshop on Multimedia and Security, pp. 214–223 (2006)
Munuera, C.: Steganography and error-correcting codes. Signal Processing 87, 1528–1533 (2007)
Fridrich, J., Soukal, D.: Matrix embedding for large payloads. IEEE Transactions on Information Security and Forensics 1(3), 390–394 (2006)
Fridrich, J., Filler, T.: Practical methods for minimizing embedding impact in steganography. In: Proc. SPIE Electronic Imaging, vol. 6050 (2007)
Willems, F., Dijk, M.: Capacity and codes for embedding information in gray-scale signals. IEEE Transactions on Information Theory 51(3), 1209–1214 (2005)
Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Communications Letters 10(11), 781–783 (2006)
Fridrich, J., Lisoněk, P.: Grid coloring in steganography. IEEE Transactions on Information Theory 53(4), 1547–1549 (2007)
Mielikainen, J.: LSB matching revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)
Zhang, W., Wang, S., Zhang, X.: Improving embedding efficiency of covering codes for applications in steganography. IEEE Communications Letters 11(8), 680–682 (2007)
Zhang, W., Zhang, X., Wang, S.: A double layered “plus-minus one” data embedding scheme. IEEE Signal Processing Letters 14(11), 848–851 (2007)
Fridrich, J., Goljan, M., Lisonek, P., Soukal, D.: Writing on wet paper. IEEE Transactions on Signal Processing 53(10), 3923–3935 (2005)
Ker, A.D.: A General Framework for the Structural Steganalysis of LSB Replacement. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 296–311. Springer, Heidelberg (2005)
Zhang, W., Li, S.: A coding problem in steganography. Designs, Codes and Cryptography 46, 67–81 (2008)
Barron, R.J., Chen, B., Wornell, G.W.: The duality between information embedding and source coding with side information and some applications. IEEE Transactions on Information Theory 49(5), 1159–1180 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, W., Zhang, X., Wang, S. (2008). Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. In: Solanki, K., Sullivan, K., Madhow, U. (eds) Information Hiding. IH 2008. Lecture Notes in Computer Science, vol 5284. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88961-8_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-88961-8_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88960-1
Online ISBN: 978-3-540-88961-8
eBook Packages: Computer ScienceComputer Science (R0)