Browse > Article
http://dx.doi.org/10.3837/tiis.2016.07.027

A Modified Product Code Over ℤ4 in Steganography with Large Embedding Rate  

Zhang, Lingyu (The State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences)
Chen, Deyuan (School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.7, 2016 , pp. 3353-3370 More about this Journal
Abstract
The way of combination of Product Perfect Codes (PPCs) is based on the theory of short codes constructing long codes. PPCs have larger embedding rate than Hamming codes by expending embedding columns in a coding block, and they have been proven to enhance the performance of the F5 steganographic method. In this paper, the proposed modified product codes called MPCs are introduced as an efficient way to embed more data than PPCs by increasing 2r2-1-r2 embedding columns. Unlike PPC, the generation of the check matrix H in MPC is random, and it is different from PPC. In addition a simple solving way of the linear algebraic equations is applied to figure out the problem of expending embedding columns or compensating cases. Furthermore, the MPCs over ℤ4 have been proposed to further enhance not only the performance but also the computation speed which reaches O(n1+σ). Finally, the proposed ℤ4-MPC intends to maximize the embedding rate with maintaining less distortion , and the performance surpasses the existing improved product perfect codes. The performance of large embedding rate should have the significance in the high-capacity of covert communication.
Keywords
Product perfect codes (PPCs); modified product codes (MPCs); larger embedding rate; ℤ4-MPCs;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Tomas Filler, Jan Judas, Jessica Fridrich, “Minimizing Additive Distortion in Steganography using Syndrome-Trellis Codes,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920-935, 2011. Article (CrossRef Link)   DOI
2 A. Westfeld, "F5-a steganographic algorithm: High capacity despite better steganalysis," in Proc. of Information Hiding, 4th International Workshop I. S, Moskowitz, Ed. New York, Springer-Verlag, vol. 2137, Lecture Notes Comput. Sci., pp. 289-302, 2001. Article (CrossRef Link)
3 J. Fridrich, and D. Soukal, “Matrix embedding for large payloads,” IEEE Trans. Inf. Security Forensics, vol. 1, no. 3, pp. 390–394, 2006. Article (CrossRef Link)   DOI
4 R.Y. Zhang, V. Sachnev, and H. J. Kim, "Fast BCH syndrome coding for steganography," in Proc. of Information Hiding, Darmstadt, Germany, pp. 48-58, 2009. Article (CrossRef Link)
5 V. Sachnev, and H. J. Kim, “Modified BCH data hiding scheme for JPEG steganography,” EURASIP Journal on Advances in Signal Processing, vol. 2012, no. 1, pp. 89-98, 2012.   DOI
6 H. Rifà-Pous, and J. Rifà, “Product perfect codes and steganography,” Digital Signal Processing, vol. 19, no 2009, pp. 764-769, 2009. Article (CrossRef Link)   DOI
7 R. Crandall, "Some Notes on Steganography," Posed on Steganography Mailing List, http://os.inf.tu-dresden.de/-westfeld/cranda ll.pdf, 1998. Article (CrossRef Link)
8 T. Pevn, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc. of Information Hiding, Lecture Notes in Computer Science, R. Bhme, P. Fong, and R. SafaviNaini, Eds. Springer Berlin / Heidelberg, pp. 161-177, 2010. Article (CrossRef Link)
9 V. Holub, J. Fridrich, "Digital Image Steganography Using Universal Distortion," in Proc. of 1st IH&MMSec Workshop, Montpellier, France, pp.59-68, June 17-19, 2013. Article (CrossRef Link)
10 J. Rifà and L. Ronquillo, "Product Perfect ℤ24-linear codes in Steganography," in Proc. of International Symposium on Information Theory and its Applications (ISITA), Taiwan, pp. 696-701, 2010. Article (CrossRef Link)
11 Z. Zhao and F. Gao, "An improved steganographic method of product perfect codes," in Proc. of Signal Processing, Communication and Computing (ICSPCC), Xian, pp. 1-5, 2011. Article (CrossRef Link)
12 T. Denemark and J. Fridrich, "Improving Steganographic Security by Synchronizing the Selection Channel," in Proc. of 3rd IH&MMSec. Workshop, Portland, Oregon, pp. 5-14, 2015. Article (CrossRef Link)
13 Zuyun Fu, Information Theory, Publishing House of Electronics Industry, China, 2007.
14 X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, 2006. Article (CrossRef Link)   DOI
15 W. M. Zhang, X. P. Zhang and S. Z. Wang, “A Double Layered “Plus-Minus One Data Embedding Scheme,” IEEE Signal Processing Letters, vol. 14, no. 11, pp.848-851, 2007. Article (CrossRef Link)   DOI
16 J. Fridrich, M. Goljan, P. Lisonek, D. Soukal, “Writing on wet paper,” IEEE Trans. Signal Process, vol. 53, no. 10, pp. 3923-3953, 2005. Article (CrossRef Link)   DOI
17 Pevny T, Bas P, Fridrich J, “Steganalysis by subtractive pixel adjacency matrix,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp.215-224, 2010. Article (CrossRef Link)   DOI
18 C. Qin, C. C. Chang and T. J. Hsu, “Reversible Data Hiding Scheme Based on Exploiting Modification Direction with Two Steganographic Images,” Multimedia Tools and Applications, vol. 74, no. 15, pp. 5861-5872, 2015. Article (CrossRef Link)   DOI
19 Xinpeng Zhang and Shouzhong Wang, “Dynamical Running Coding in Digital Steganography,” IEEE Signal Processing Letters, vol. 13, no. 3, pp. 165-168, 2006. Article (CrossRef Link)   DOI
20 C. Qin, C. C. Chang, Y. H. Huang, and L. T. Liao, “An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 23, no. 7, pp.1109-1118, 2013. Article (CrossRef Link)   DOI
21 Zhou Peng, Nadeem T, Kang P, et al, "EZCab: A cab booking application using short-range wireless communication," in Proc of IEEE Int Conf Pervasive Computing and Communications (PerCom), Piscataway, NJ:IEEE, pp.27-38, 2015. Article (CrossRef Link)
22 Li Chuan, Hutchins D A, Green R J, “Short-range ultrasonic digital communications in air,” IEEE Trans on Ultrasonic, Ferroelectrics and Frequency Control, vol. 55, no. 4, pp. 908-918, 2008. Article (CrossRef Link)   DOI
23 T. Filler, A. Ker and J. Fridrich, "The square root law of steganographic capacity for markov covers," in Proc. of Media Forensics and security XI, pp. 801-811, 2009. Article (CrossRef Link)
24 Lingyu Zhang, Diao Chen, Yun Cao and Xianfeng Zhao, "A Practical Method to Determine Achievable Rates for Secure Steganography," in Proc. of 17th IEEE International Symposium on Cyberspace Safety and Security (CSS), NewYork, USA, pp.1274-1281, 2015. Article (CrossRef Link)