DOI QR코드

DOI QR Code

Ternary Bose - Chaudhuri - Hocquenghem (BCH) with t = 2 code for steganography

3진 BCH (Bose - Chaudhuri - Hocquenghem) 코드를 이용하는 스테가노그라피 기법

  • Sachnev, Vasily (School of Information, Communication and Electronics Engineering, Catholic University) ;
  • Choi, Yong Soo (Division of Liberal Arts & Teaching, Sungkyul University)
  • Received : 2016.12.03
  • Accepted : 2016.12.30
  • Published : 2016.12.31

Abstract

A novel steganography based on ternary BCH code with t = 2 is presented in this paper. Proposed method utilizes powerful BCH code with t = 2 for data hiding to the DCT coefficients from JPEG images. The presented data hiding technique uses a proposed look up table approach for searching multiple solutions for ternary BCH code with t = 2. The proposed look up table approach enables fast and efficient search for locations of DCT coefficients, which are necessary to modify for hiding data. Presented data hiding technique is the first steganography technique based on ternary BCH code. Experimental results clearly indicate advantages of using ternary BCH compared to binary BCH.

본 논문에서는 t = 2인 3진 BCH 코드를 기반으로 하는 새로운 스테가노그라피 방법을 제시한다. 제안 된 방법에서는 JPEG 영상으로부터 추출된 DCT 계수들에 데이터 은닉을 하기 위해 t = 2인 강력한 BCH 코드를 사용하였다. 제안하는 데이터 은닉 기술은 삼진 BCH 코드(t=2인 경우)에서 다양한 해결책을 찾기 위한 접근으로 제안된 룩업테이블을 사용하였다. 고안된 룩업 테이블 접근법은 데이터 은닉을 위해 수정이 필요한 DCT 계수들의 위치를 빠르고 효율적으로 연산 가능하게 하였다. 제시된 데이터 은닉 기술은 삼진 BCH 코드를 이용하는 최초의 스테가노그라피 기술이다. 실험 결과를 통해 이진 BCH 코드에 비해 삼진 BCH 코드를 사용하는 것이 우수함을 명확하게 증명하였다.

Keywords

References

  1. D. Upham: http://www.funet.fi/pub/crypt/stegangraphy/jpeg-jsteg-v4.di(R).gz.
  2. N. Provos: Defending against statistical steganalysis. Proc. of 10th USENIX Security Symposium, Washington, DC, 2001.
  3. A. Westfeld: High capacity despite better steganalysis (F5 - a steganographic algorithm). Lecture Notes in Computer Science, vol. 2137, pp. 289 - 302, 2001. https://doi.org/10.1007/3-540-45496-9_21
  4. J. Eggers, R. Bauml, and B. Girod: A communications approach to steganography. Proc. of EI SPIE, vol. 4675, pp. 26 - 37, San Jose, CA, 2002.
  5. H.Noda, M. Niimi, and E. Kawaguchi: Application of QIM with dead zone for histogram preserving JPEG steganography. Proc. of ICIP, Genova, Italy, 2005.
  6. K. Solanki, A. Sakar, and B.S. Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. Information Hiding, 9th International Workshop Saint Malo, 2007.
  7. D. SchAonfeld and A. Winkler: Reducing the complexity of syndrome coding for embedding. Lecture Notes in Computer Science, vol. 4567, 2008, 145 - 158.
  8. R. Zhang, V. Sachnev, and H. J. Kim: Fast BCH syndrome coding for steganography. Lecture Notes in Computer Science, vol. 5806, pp. 48 - 58, 2009. https://doi.org/10.1007/978-3-642-04431-1_4
  9. V. Sachnev, H. J. Kim, R. Zhang, Less Detectable JPEG Steganography Method Based on Heuristic Optimization and BCH Syndrome Coding, Proceeding of the 11th ACM workshop on Multimedia and Security, pp 131 - 140, Princeton, 2009.
  10. T. Filler, J. Judas, and J. Fridrich, "Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes," IEEE Transaction on Information Forensics and Security, vol. 6, n. 3, pp. 920-935, 2011. https://doi.org/10.1109/TIFS.2011.2134094
  11. J. Fridrich, "Minimizing the embedding impact in steganography," Proceedings of ACM Multimedia and Security Workshop, pp. 2-10, 2006.
  12. J. Fridrich and T. Filler, "Practical methods for minimizing embedding impact in steganography," Proceedings of SPIE, vol. 6505, pp. 2-3, 2007.
  13. J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography," ACM Multimedia and Security Journal, vol. 11, no. 2, pp. 98-107, 2005. https://doi.org/10.1007/s00530-005-0194-3
  14. J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography using wet paper codes," Proceedings of ACM Workshop on Multimedia and Security, pp. 4-15, 2004.
  15. J. Fridrich, T. Pevny, and J. Kodovsky, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities," Proceedings of ACM Workshop on Multimedia and Security, pp. 3-15, 2007.
  16. J. Fridrich and J. Kodovsky, "Rich models for steganalysis of digital images", IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868 - 882, 2012. https://doi.org/10.1109/TIFS.2012.2190402
  17. J. Kodovsky, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transactions on Information Security and Forensics, Vol. 7, No. 2, pp. 432-444, 2012. https://doi.org/10.1109/TIFS.2011.2175919
  18. V. Sachnev, H. J. Kim, Ternary Data Hiding Technique for JPEG Steganography, Lecture Notes and Computer Science, vol. 6526, pp 202 - 210.
  19. Y. H. Kim, Z. Duric, and D. Richards, Modified matrix encoding technique for minimal distortion steganography. Information Hiding, 8th International Workshop, vol. 4437, pp. 314 - 327, Springer-Verlag, Berlin, 2006
  20. P. Bass, T. Filler, T. Pevny, "Break Our Steganographic System - the ins and outs of organizing BOSS", In proceedings of 13th Information Hiding Conference, Prague, 2011.
  21. Y. S. Choi and J. H. Kim, "A Steganography Method Improving Image Quality and Minimizing Image Degradation," J. of Digital Contents Society, Vol.17, No.5, 2016

Cited by

  1. Improved histogram shifting-based data hiding method with alternative skipping method for image retrieval vol.35, pp.6, 2016, https://doi.org/10.3233/jifs-169859