Wet paper codes and the dual distance in steganography
نویسندگان
چکیده
In 1998 Crandall introduced a method based on coding theory to secretly embed a message in a digital support such as an image. Later Fridrich et al. improved this method to minimize the distortion introduced by the embedding; a process called wet paper. However, as previously emphasized in the literature, this method can fail during the embedding step. Here we find sufficient and necessary conditions to guarantee a successful embedding by studying the dual distance of a linear code. Since these results are essentially of combinatorial nature, they can be generalized to systematic codes, a large family containing all linear codes. We also compute the exact number of solutions and point out the relationship between wet paper codes and orthogonal arrays.
منابع مشابه
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes
For good security and large payload in steganography, it is desired to embed as many messages as possible per change of the coverobject, i.e., to have high embedding efficiency. Steganographic codes derived from covering codes can improve embedding efficiency. In this paper, we propose a new method to construct stego-codes, showing that not just one but a family of stego-codes can be generated ...
متن کاملEfficient Wet Paper Codes
Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipient. In this paper, we describe new approaches to wet paper codes that enjoy low computational complexity and improved embedding efficiency (number of message bits per embedding change). Some applications of wet paper codes to st...
متن کاملMinimizing embedding impact in steganography using trellis-coded quantization
In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance with bounds derived from appropriate rate-distortion bounds. We assume that each cover element can be assigned a positive scalar expressing the impact of making an embedding change at that element (single-letter disto...
متن کاملUsing of Polar Codes in Steganography
Steganography is the art of secret communication. Since the advent of modern steganography, in the 2000s, many approaches based on error correcting codes (Hamming, BCH, RS, STC ...) have been proposed to reduce the number of changes in the roof while inserting the maximum bit. In this paper we propose a new steganography scheme based on the polar codes. The scheme works according to two steps. ...
متن کاملA Novel method of Reducing Additive Distortion in Steganography with Embedding Operation
–This paper proposes a new methodology for reducing additive distortion in steganography with embedding operation. In this paper it is planned to introduce a method that embed 2 bits information in a pixel and alter one bit from one bit plane but the message does not necessarily place in the least significant bit of pixel and second less significant bit plane and fourth less significant bit pla...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Adv. in Math. of Comm.
دوره 6 شماره
صفحات -
تاریخ انتشار 2012