Generalization of the ZZW Embedding Construction for Steganography

We generalize the Zhang, Zhang, and Wang (ZZW) construction to produce larger code families for steganography from existing codes, which can cover the range of relative payloads more densely. We also prove that the expanded code family keeps the similar asymptotic property as the code family produced by the ZZW construction, that is, the codes follow the theoretic upper bound on embedding efficiency as relative payload tends to zero.

[1]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[2]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[3]  Jessica J. Fridrich,et al.  Grid Colorings in Steganography , 2007, IEEE Transactions on Information Theory.

[4]  Jessica J. Fridrich,et al.  Asymptotic Behavior of the ZZW Embedding Construction , 2009, IEEE Transactions on Information Forensics and Security.

[5]  Xinpeng Zhang,et al.  Efficient double-layered steganographic embedding , 2007 .

[6]  R. Crandall,et al.  Some Notes on Steganography , 1999 .

[7]  Jessica J. Fridrich,et al.  Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.

[8]  Jessica J. Fridrich,et al.  Efficient Wet Paper Codes , 2005, Information Hiding.

[9]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[10]  Weiming Zhang,et al.  A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.

[11]  Weiming Zhang,et al.  Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.

[12]  Gregory A. Kabatiansky,et al.  Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[13]  Jessica J. Fridrich,et al.  Minimizing the embedding impact in steganography , 2006, MM&Sec '06.

[14]  Antje Winkler,et al.  Embedding with syndrome coding based on BCH codes: The corrected version of this paper is now available as full text. To view the original document as presented in the printed proceedings (with its errors), download the supplemental file , 2006, MM&Sec '06.

[15]  Andrew D. Ker Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.

[16]  Marten van Dijk,et al.  Capacity and codes for embedding information in gray-scale signals , 2005, IEEE Transactions on Information Theory.

[17]  Jessica J. Fridrich,et al.  Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..

[18]  Carlos Munuera,et al.  Steganography and error-correcting codes , 2007, Signal Process..