Wet paper codes and the dual distance in steganography

نویسندگان

  • Carlos Munuera
  • Morgan Barbier
چکیده

In 1998 Crandall introduced a method based on coding theory to secretly embed a message in a digital support such as an image. Later Fridrich et al. improved this method to minimize the distortion introduced by the embedding; a process called wet paper. However, as previously emphasized in the literature, this method can fail during the embedding step. Here we find sufficient and necessary conditions to guarantee a successful embedding by studying the dual distance of a linear code. Since these results are essentially of combinatorial nature, they can be generalized to systematic codes, a large family containing all linear codes. We also compute the exact number of solutions and point out the relationship between wet paper codes and orthogonal arrays.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes

For good security and large payload in steganography, it is desired to embed as many messages as possible per change of the coverobject, i.e., to have high embedding efficiency. Steganographic codes derived from covering codes can improve embedding efficiency. In this paper, we propose a new method to construct stego-codes, showing that not just one but a family of stego-codes can be generated ...

متن کامل

Efficient Wet Paper Codes

Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipient. In this paper, we describe new approaches to wet paper codes that enjoy low computational complexity and improved embedding efficiency (number of message bits per embedding change). Some applications of wet paper codes to st...

متن کامل

Minimizing embedding impact in steganography using trellis-coded quantization

In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance with bounds derived from appropriate rate-distortion bounds. We assume that each cover element can be assigned a positive scalar expressing the impact of making an embedding change at that element (single-letter disto...

متن کامل

Using of Polar Codes in Steganography

Steganography is the art of secret communication. Since the advent of modern steganography, in the 2000s, many approaches based on error correcting codes (Hamming, BCH, RS, STC ...) have been proposed to reduce the number of changes in the roof while inserting the maximum bit. In this paper we propose a new steganography scheme based on the polar codes. The scheme works according to two steps. ...

متن کامل

A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation

–This paper proposes a new methodology for reducing additive distortion in steganography with embedding operation. In this paper it is planned to introduce a method that embed 2 bits information in a pixel and alter one bit from one bit plane but the message does not necessarily place in the least significant bit of pixel and second less significant bit plane and fourth less significant bit pla...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Adv. in Math. of Comm.

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2012