Minimizing embedding impact in steganography using trellis-coded quantization

In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance with bounds derived from appropriate rate-distortion bounds. We assume that each cover element can be assigned a positive scalar expressing the impact of making an embedding change at that element (single-letter distortion). The problem is to embed a given payload with minimal possible average embedding impact. This task, which can be viewed as a generalization of matrix embedding or writing on wet paper, has been approached using heuristic and suboptimal tools in the past. Here, we propose a fast and very versatile solution to this problem that can theoretically achieve performance arbitrarily close to the bound. It is based on syndrome coding using linear convolutional codes with the optimal binary quantizer implemented using the Viterbi algorithm run in the dual domain. The complexity and memory requirements of the embedding algorithm are linear w.r.t. the number of cover elements. For practitioners, we include detailed algorithms for finding good codes and their implementation. Finally, we report extensive experimental results for a large set of relative payloads and for different distortion profiles, including the wet paper channel.

[1]  Hyoung Joong Kim,et al.  Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding , 2009, MM&Sec '09.

[2]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[3]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[4]  Marten van Dijk,et al.  Embedding Information in Grayscale Images , 2001 .

[5]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[6]  Andrew J. Viterbi,et al.  Trellis Encoding of memoryless discrete-time sources with a fidelity criterion , 1974, IEEE Trans. Inf. Theory.

[7]  Jessica J. Fridrich,et al.  Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..

[8]  Weiming Zhang,et al.  Generalization of the ZZW Embedding Construction for Steganography , 2009, IEEE Transactions on Information Forensics and Security.

[9]  Jessica J. Fridrich,et al.  Perturbed quantization steganography , 2005, Multimedia Systems.

[10]  Jessica J. Fridrich,et al.  Influence of embedding strategies on security of steganographic methods in the JPEG domain , 2008, Electronic Imaging.

[11]  Neri Merhav,et al.  On the error exponent of trellis source coding , 2005, IEEE Transactions on Information Theory.

[12]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[13]  Jessica J. Fridrich,et al.  The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.

[14]  Weiming Zhang,et al.  Improving the Embedding Efficiency of Wet Paper Codes by Paper Folding , 2009, IEEE Signal Processing Letters.

[15]  Yuhong Yang,et al.  Information Theory, Inference, and Learning Algorithms , 2005 .

[16]  Vladimir Sidorenko,et al.  Decoding of convolutional codes using a syndrome trellis , 1994, IEEE Trans. Inf. Theory.

[17]  Jessica J. Fridrich,et al.  Calibration revisited , 2009, MM&Sec '09.

[18]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[19]  Jessica J. Fridrich,et al.  Wet ZZW construction for steganography , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[20]  Antje Winkler,et al.  Embedding with syndrome coding based on BCH codes: The corrected version of this paper is now available as full text. To view the original document as presented in the printed proceedings (with its errors), download the supplemental file , 2006, MM&Sec '06.

[21]  Aaron D. Wyner,et al.  Coding Theorems for a Discrete Source With a Fidelity CriterionInstitute of Radio Engineers, International Convention Record, vol. 7, 1959. , 1993 .

[22]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[23]  Dana S. Richards,et al.  Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.

[24]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[25]  Jessica J. Fridrich,et al.  Asymptotic Behavior of the ZZW Embedding Construction , 2009, IEEE Transactions on Information Forensics and Security.

[26]  R. Crandall,et al.  Some Notes on Steganography , 1999 .

[27]  Jessica J. Fridrich,et al.  Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.

[28]  Jessica J. Fridrich,et al.  Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.

[29]  David J. C. MacKay,et al.  Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.

[30]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.