Efficient large payloads ternary matrix embedding

Matrix embedding (ME) can be exploited to improve the embedding efficiency for steganography by making fewer changes to the cover data. In ME, the sender and recipient agree on a parity check matrix (PCM) in advance. The PCM will be used by the sender to embed secret message into the cover data and later by the decoder to extract the embedded message. The embedding performance of ME is greatly influenced by the PCM thus the choice of PCM is crucial for ME. On the other hand, since larger sized PCM usually leads to higher embedding efficiency, how to keep the balance between the computational complexity and the embedding efficiency is also an important problem of ME. Based on these considerations, an efficient ternary ME method for large payloads data embedding is proposed in this paper. We utilize a specific matrix construction for PCM to improve embedding efficiency and a sub-optimal search strategy to reduce the computational complexity. The experimental results show that the proposed method achieves good embedding efficiency at low time cost and it outperforms some state-of-the-art works. For example, for a cover image with 512 × 512 pixels at an embedding rate of 1 bit per pixel, the proposed method can be implemented within 0.5 second in a personal computer with a rather high embedding efficiency as 3.89.

[1]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[2]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[3]  Yunkai Gao,et al.  Employing Optimal Matrix for Efficient Matrix Embedding , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[4]  Marten van Dijk,et al.  Embedding Information in Grayscale Images , 2001 .

[5]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[6]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[7]  Tieyong Zeng,et al.  A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.

[8]  Xiaolong Li,et al.  A further study of large payloads matrix embedding , 2015, Inf. Sci..

[9]  Jun Yu,et al.  Capacity Limits of Pseudorandom Channels in Deception Problems , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[11]  XiongNaixue,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016 .

[12]  Wen-Chung Kuo,et al.  A Formula Diamond Encoding Data Hiding Scheme , 2015, J. Inf. Hiding Multim. Signal Process..

[13]  Jessica J. Fridrich,et al.  On Steganographic Embedding Efficiency , 2006, Information Hiding.

[14]  Yunkai Gao,et al.  Improving embedding efficiency via matrix embedding: A case study , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[15]  Wen-Chung Kuo,et al.  Binary power data hiding scheme , 2015 .

[16]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[17]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[18]  Yen-Ping Chu,et al.  A Novel Image Data Hiding Scheme with Diamond Encoding , 2009, EURASIP J. Inf. Secur..

[19]  Chun-Cheng Wang,et al.  Signed digit data hiding scheme , 2016, Inf. Process. Lett..

[20]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[21]  Reza Safabakhsh,et al.  Reducing the embedding impact in steganography using Hamiltonian paths and writing on wet paper , 2014, Multimedia Tools and Applications.

[22]  Weiming Zhang,et al.  Fast Matrix Embedding by Matrix Extending , 2012, IEEE Transactions on Information Forensics and Security.

[23]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[24]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[25]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[26]  Bo Li,et al.  Preestimation-Based Array Interpolation Approach to Coherent Source Localization Using Multiple Sparse Subarrays , 2009, IEEE Signal Processing Letters.

[27]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.

[28]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.

[29]  Bin Li,et al.  Steganalysis of a PVD-based content adaptive image steganography , 2013, Signal Process..

[30]  Tung-Shou Chen,et al.  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.

[31]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[32]  Jessica J. Fridrich,et al.  Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..

[33]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[34]  Bin Li,et al.  A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.

[35]  Jun Li,et al.  A game-theoretic method for designing distortion function in spatial steganography , 2017, Multimedia Tools and Applications.