Matrix embedding in finite abelian group

Matrix embedding (ME) is a well-known steganographic scheme that can improve the embedding efficiency of steganography. In ME, the sender and recipient agree on a matrix in advance, and the message will be embedded into the cover data according to the matrix. In this paper, we propose a general framework for ME based on covering sequence (CS) of finite abelian group. By the proposed approach, the to-be-embedded message is regraded as an element of a finite abelian group, and it can be embedded into the cover data according to a CS of the group. It can be verified that many previous works, including the conventional ME (binary and ternary) and the sum and difference covering set based steganography, are special cases of the proposed general framework. The proposed CS-based ME formally extends these classical algorithms, and it provides a general way for designing efficient steganography. Some examples of CS-based ME and their performance evaluation are also given for a better illustration. HighlightsA general framework for ME based on CS in finite abelian group is proposed.Many previously proposed steganographic algorithms are special cases of the proposed general framework.Some examples of CS-based ME are given.The proposed CS-based ME can provide high embedding efficiency and secure steganography.

[1]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[2]  X. Zhang,et al.  Improved modification direction methods , 2010, Comput. Math. Appl..

[3]  Jessica J. Fridrich,et al.  Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.

[4]  Arnulf Von Mrose Untere Schranken für die Reichweiten von Extremalbasen fester Ordnung , 1979 .

[5]  Gregory A. Kabatiansky,et al.  Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[6]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[7]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[8]  Tieyong Zeng,et al.  A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.

[9]  Wien Hong,et al.  Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique , 2013, Inf. Sci..

[10]  Chin-Chen Chang,et al.  A steganographic scheme by fully exploiting modification directions , 2011, Expert Syst. Appl..

[11]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[12]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[13]  Yunkai Gao,et al.  Improving embedding efficiency via matrix embedding: A case study , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[14]  Bin Wang,et al.  A Study of Optimal Matrix for Efficient Matrix Embedding in , 2012, IWDW.

[15]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[16]  Jessica J. Fridrich,et al.  Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..

[17]  Petr Lisonek,et al.  Linear codes for high payload steganography , 2009, Discret. Appl. Math..

[18]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[19]  Huan Xu,et al.  An improved section-wise exploiting modification direction method , 2010, Signal Process..

[20]  Yen-Ping Chu,et al.  A Novel Image Data Hiding Scheme with Diamond Encoding , 2009, EURASIP J. Inf. Secur..

[21]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .

[22]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[23]  Bin Li,et al.  Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting , 2012, IEEE Signal Processing Letters.

[24]  Hyoung-Joong Kim,et al.  Ternary Data Hiding Technique for JPEG Steganography , 2010, IWDW.

[25]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[26]  Bin Li,et al.  Steganalysis of a PVD-based content adaptive image steganography , 2013, Signal Process..

[27]  Tung-Shou Chen,et al.  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.

[28]  Jessica J. Fridrich,et al.  On Steganographic Embedding Efficiency , 2006, Information Hiding.

[29]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[30]  Chin-Chen Chang,et al.  A novel multi-group exploiting modification direction method based on switch map , 2012, Signal Process..

[31]  Xinpeng Zhang,et al.  Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..

[32]  Harri. Haanpaa,et al.  Minimum Sum and Difierence Covers of Abelian Groups , 2004 .

[33]  Weiming Zhang,et al.  Fast Matrix Embedding by Matrix Extending , 2012, IEEE Transactions on Information Forensics and Security.

[34]  Tieyong Zeng,et al.  Improvement of the embedding efficiency of LSB matching by sum and difference covering set , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[35]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.

[36]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[37]  Cheng-Hsing Yang,et al.  Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy , 2007 .

[38]  Xiaoqing Lu,et al.  Improving embedding efficiency by incorporating SDCS and WPC , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[39]  S. Fraser,et al.  Sum covers in steganography , 2008 .

[40]  Weiming Zhang,et al.  Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.

[41]  Jessica J. Fridrich,et al.  Grid Colorings in Steganography , 2007, IEEE Transactions on Information Theory.

[42]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[43]  Wen-Chung Kuo Image Hiding by Square Fully Exploiting Modification Directions , 2013, J. Inf. Hiding Multim. Signal Process..

[44]  D. Frank Hsu,et al.  Additive Bases and Extremal Problems in Groups, Graphs and Networks , 2002 .

[45]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[46]  Xiaolong Li,et al.  A Further Study on a PVD-Based Steganography , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[47]  Jessica J. Fridrich,et al.  Minimizing the embedding impact in steganography , 2006, MM&Sec '06.

[48]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[49]  N. J. A. Sloane,et al.  On Additive Bases and Harmonious Graphs , 1980, SIAM J. Algebraic Discret. Methods.

[50]  Vladimir Sidorenko,et al.  Decoding of convolutional codes using a syndrome trellis , 1994, IEEE Trans. Inf. Theory.

[51]  M. van Dijk,et al.  Codes for Embedding Information in Grayscale Signals , 2001 .

[52]  Gérard D. Cohen,et al.  Covering Codes , 2005, North-Holland mathematical library.

[53]  Marten van Dijk,et al.  Embedding Information in Grayscale Images , 2001 .

[54]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[55]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[56]  Wen-Chung Kuo,et al.  Hybrid GEMD Data Hiding , 2014, J. Inf. Hiding Multim. Signal Process..

[57]  Robert E. Jamison,et al.  Minimum Sum Covers of Small Cyclic Groups , 2000 .

[58]  Yunkai Gao,et al.  Employing Optimal Matrix for Efficient Matrix Embedding , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.