A further study of large payloads matrix embedding

A further study of large payloads ME by improving the embedding efficiency is proposed.A new matrix is constructed for ME.A sub-optimal search strategy is exploited to reduce the computational complexity.Effective and practically feasible large payloads ME can be realized by the proposed method. Matrix embedding (ME) is a well-known steganographic method that can improve the embedding efficiency. In ME, the sender and recipient agree in advance on a parity check matrix (PCM) of a binary linear code and utilize the PCM for data embedding. At the decoder side, the embedded message can be extracted by the recipient as the syndrome of the received stego data. The PCM can be taken as any full-ranked matrix and its selection is actually crucial to the embedding performance. In this paper, by extending some previous works, we propose a novel scheme to further improve the embedding efficiency of large payloads ME. First, we utilize a new and specifically designed matrix for ME. Then, instead of finding a coset leader as the modification to the cover which is time consuming, we turn to finding a vector in the coset with relatively small Hamming weight. By the proposed approach, effective and practically feasible large payloads ME can be realized, and extensive experiments show that, a significant increase of embedding efficiency is achieved compared with some state-of-the-art works.

[1]  Chi-Yuan Lin,et al.  A Suboptimal Embedding Algorithm for Binary Matrix Embedding , 2012, 2012 International Symposium on Computer, Consumer and Control.

[2]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[3]  Petr Lisonek,et al.  Linear codes for high payload steganography , 2009, Discret. Appl. Math..

[4]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[5]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[6]  Jessica J. Fridrich,et al.  Asymptotic Behavior of the ZZW Embedding Construction , 2009, IEEE Transactions on Information Forensics and Security.

[7]  Jessica J. Fridrich,et al.  Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..

[8]  Gregory A. Kabatiansky,et al.  Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[9]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[10]  Jessica J. Fridrich,et al.  On Steganographic Embedding Efficiency , 2006, Information Hiding.

[11]  Weiming Zhang,et al.  Adaptive ±1 Steganography in Extended Noisy Region , 2014, Comput. J..

[12]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[13]  Nameer N. El-Emam,et al.  New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm , 2013, J. Syst. Softw..

[14]  Jyun-Jie Wang,et al.  A suboptimal embedding algorithm with low complexity for binary data hiding , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[15]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[16]  Oscar C. Au,et al.  Data Hiding with Tree Based Parity Check , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[17]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[18]  Yunkai Gao,et al.  Constructing specific matrix for efficient matrix embedding , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[19]  Yunkai Gao,et al.  Employing Optimal Matrix for Efficient Matrix Embedding , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[20]  Florent Retraint,et al.  Application of hypothesis testing theory for optimal detection of LSB matching data hiding , 2013, Signal Process..

[21]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[22]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[23]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[24]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[25]  Wien Hong,et al.  Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique , 2013, Inf. Sci..

[26]  Weiming Zhang,et al.  Fast Matrix Embedding by Matrix Extending , 2012, IEEE Transactions on Information Forensics and Security.

[27]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[28]  Yunkai Gao,et al.  Improving embedding efficiency via matrix embedding: A case study , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[29]  Wen-Guey Tzeng,et al.  An Optimal Data Hiding Scheme With Tree-Based Parity Check , 2011, IEEE Transactions on Image Processing.

[30]  Weiwei Liu,et al.  Adaptive steganography based on block complexity and matrix embedding , 2013, Multimedia Systems.

[31]  Xinpeng Zhang,et al.  Efficient Data Hiding With Plus-Minus One or Two , 2010, IEEE Signal Processing Letters.

[32]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[33]  Tao Zhang,et al.  Steganalysis of LSB matching based on statistical modeling of pixel difference distributions , 2010, Inf. Sci..

[34]  Weiming Zhang,et al.  Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.

[35]  Marten van Dijk,et al.  Embedding Information in Grayscale Images , 2001 .

[36]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[37]  Ajaz Hussain Mir,et al.  Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..

[38]  Chao-Tsun Chang,et al.  A compact covering method to exploit embedding capacity for matrix encoding , 2012, Inf. Sci..

[39]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[40]  Chin-Chen Chang,et al.  Optimizing least-significant-bit substitution using cat swarm optimization strategy , 2012, Inf. Sci..

[41]  Fenlin Liu,et al.  A review on blind detection for image steganography , 2008, Signal Process..

[42]  Der-Chyuan Lou,et al.  A novel adaptive steganography based on local complexity and human vision sensitivity , 2010, J. Syst. Softw..

[43]  Qian Mao,et al.  A fast algorithm for matrix embedding steganography , 2014, Digit. Signal Process..