Browse > Article
http://dx.doi.org/10.9728/dcs.2016.17.6.461

Ternary Bose - Chaudhuri - Hocquenghem (BCH) with t = 2 code for steganography  

Sachnev, Vasily (School of Information, Communication and Electronics Engineering, Catholic University)
Choi, Yong Soo (Division of Liberal Arts & Teaching, Sungkyul University)
Publication Information
Journal of Digital Contents Society / v.17, no.6, 2016 , pp. 461-469 More about this Journal
Abstract
A novel steganography based on ternary BCH code with t = 2 is presented in this paper. Proposed method utilizes powerful BCH code with t = 2 for data hiding to the DCT coefficients from JPEG images. The presented data hiding technique uses a proposed look up table approach for searching multiple solutions for ternary BCH code with t = 2. The proposed look up table approach enables fast and efficient search for locations of DCT coefficients, which are necessary to modify for hiding data. Presented data hiding technique is the first steganography technique based on ternary BCH code. Experimental results clearly indicate advantages of using ternary BCH compared to binary BCH.
Keywords
BCH Code; Steganography; Compression Domain; Coefficients;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 D. Upham: http://www.funet.fi/pub/crypt/stegangraphy/jpeg-jsteg-v4.di(R).gz.
2 A. Westfeld: High capacity despite better steganalysis (F5 - a steganographic algorithm). Lecture Notes in Computer Science, vol. 2137, pp. 289 - 302, 2001.   DOI
3 J. Eggers, R. Bauml, and B. Girod: A communications approach to steganography. Proc. of EI SPIE, vol. 4675, pp. 26 - 37, San Jose, CA, 2002.
4 H.Noda, M. Niimi, and E. Kawaguchi: Application of QIM with dead zone for histogram preserving JPEG steganography. Proc. of ICIP, Genova, Italy, 2005.
5 K. Solanki, A. Sakar, and B.S. Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. Information Hiding, 9th International Workshop Saint Malo, 2007.
6 D. SchAonfeld and A. Winkler: Reducing the complexity of syndrome coding for embedding. Lecture Notes in Computer Science, vol. 4567, 2008, 145 - 158.
7 R. Zhang, V. Sachnev, and H. J. Kim: Fast BCH syndrome coding for steganography. Lecture Notes in Computer Science, vol. 5806, pp. 48 - 58, 2009.   DOI
8 V. Sachnev, H. J. Kim, R. Zhang, Less Detectable JPEG Steganography Method Based on Heuristic Optimization and BCH Syndrome Coding, Proceeding of the 11th ACM workshop on Multimedia and Security, pp 131 - 140, Princeton, 2009.
9 T. Filler, J. Judas, and J. Fridrich, "Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes," IEEE Transaction on Information Forensics and Security, vol. 6, n. 3, pp. 920-935, 2011.   DOI
10 N. Provos: Defending against statistical steganalysis. Proc. of 10th USENIX Security Symposium, Washington, DC, 2001.
11 J. Fridrich, "Minimizing the embedding impact in steganography," Proceedings of ACM Multimedia and Security Workshop, pp. 2-10, 2006.
12 J. Fridrich and T. Filler, "Practical methods for minimizing embedding impact in steganography," Proceedings of SPIE, vol. 6505, pp. 2-3, 2007.
13 J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography," ACM Multimedia and Security Journal, vol. 11, no. 2, pp. 98-107, 2005.   DOI
14 J. Kodovsky, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transactions on Information Security and Forensics, Vol. 7, No. 2, pp. 432-444, 2012.   DOI
15 J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography using wet paper codes," Proceedings of ACM Workshop on Multimedia and Security, pp. 4-15, 2004.
16 J. Fridrich, T. Pevny, and J. Kodovsky, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities," Proceedings of ACM Workshop on Multimedia and Security, pp. 3-15, 2007.
17 J. Fridrich and J. Kodovsky, "Rich models for steganalysis of digital images", IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868 - 882, 2012.   DOI
18 V. Sachnev, H. J. Kim, Ternary Data Hiding Technique for JPEG Steganography, Lecture Notes and Computer Science, vol. 6526, pp 202 - 210.
19 Y. H. Kim, Z. Duric, and D. Richards, Modified matrix encoding technique for minimal distortion steganography. Information Hiding, 8th International Workshop, vol. 4437, pp. 314 - 327, Springer-Verlag, Berlin, 2006
20 P. Bass, T. Filler, T. Pevny, "Break Our Steganographic System - the ins and outs of organizing BOSS", In proceedings of 13th Information Hiding Conference, Prague, 2011.
21 Y. S. Choi and J. H. Kim, "A Steganography Method Improving Image Quality and Minimizing Image Degradation," J. of Digital Contents Society, Vol.17, No.5, 2016