A Double Layered “Plus-Minus One” Data Embedding Scheme

In image steganography, a pixel can carry secret bits by choosing adding/subtracting one to/from the gray value. This kind of "plusmn1 steganography" can hide a longer message than simple LSB embedding. We propose a double-layered embedding method for implementing "plusmn1 steganography," in which binary covering codes and wet paper codes are used to hide messages in the LSB plane and the second LSB plane, respectively. We show that this method can achieve the upper bound on the embedding efficiency of "plusmn1 steganography" when the employed binary covering codes reach the upper bound on that of LSB steganography. Applications using random and structured covering codes show that the new method outperforms previous ones and can approach the upper bound.

[1]  Jessica J. Fridrich,et al.  Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..

[2]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[3]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.

[4]  Jessica J. Fridrich,et al.  Grid Colorings in Steganography , 2007, IEEE Transactions on Information Theory.

[5]  R. Crandall,et al.  Some Notes on Steganography , 1999 .

[6]  Marten van Dijk,et al.  Capacity and codes for embedding information in gray-scale signals , 2005, IEEE Transactions on Information Theory.

[7]  Yu-Chee Tseng,et al.  A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..

[8]  Jessica J. Fridrich,et al.  Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.

[9]  Jessica J. Fridrich,et al.  Efficient Wet Paper Codes , 2005, Information Hiding.

[10]  Antje Winkler,et al.  Embedding with syndrome coding based on BCH codes: The corrected version of this paper is now available as full text. To view the original document as presented in the printed proceedings (with its errors), download the supplemental file , 2006, MM&Sec '06.

[11]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[12]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[13]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[14]  Gregory A. Kabatiansky,et al.  Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).