An optimized data hiding scheme for Deflate codes

Compression file is a common form of carriers in network data transmission; therefore, it is essential to investigate the data hiding schemes for compression files. The existing data hiding schemes embed secret bits by shrinking the length of symbols, while they are not secure enough since the shrinking of symbol length is easily detected. First, we propose a longest match detecting algorithm that can detect the data hiding behavior of shrinking the length of symbols, by checking whether items of the generated dictionary are longest matches or not. Then, we propose a secret data hiding scheme based on Deflate codes, which reversibly embeds secret data by altering the matching process, to choose the proper matching result that the least significant bit of length field in [distance, length] pair is equal to the current embedded secret bit. The proposed data hiding scheme can resist on the longest match detection, and the embedding rate is higher than DH-LZW algorithm. The experiment shows that the proposed scheme achieves 5.12% of embedding rate and 10.18% size increase in the compressed file. Moreover, an optimization is made in providing practical suggestion for DH-Deflate data hiding. One can choose which format and size of files are to be selected based upon the optimization, and thus, data hiding work can be achieved in a convenient and targeted way.

[1]  Yu-an Tan,et al.  An Effective RAID Data Layout for Object-Based De-duplication Backup System , 2016 .

[2]  Chin-Chen Chang,et al.  A method of extracting embedded binary data from JPEG bitstreams using standard JPEG decoder , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[3]  Jing-Ming Guo,et al.  High Capacity Data Hiding for Error-Diffused Block Truncation Coding , 2012, IEEE Transactions on Image Processing.

[4]  A. Nikolaidis,et al.  Reversible data hiding in JPEG images utilising zero quantised coefficients , 2015, IET Image Process..

[5]  Arvind Kumar,et al.  Steganography- A Data Hiding Technique , 2010 .

[6]  Wen-Hsiang Tsai,et al.  A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.

[7]  K.C. Navada,et al.  Determination of Sequences Responsible for Generation of a Sequence , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[8]  Hossein L. Najafi A neural network approach to audio data hiding based on perceptual masking model of the human auditory system , 2007 .

[9]  Byeungwoo Jeon,et al.  DH-LZW: lossless data hiding in LZW compression , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[10]  Weiming Zhang,et al.  Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression , 2013, IEEE Transactions on Image Processing.

[11]  Jian Li,et al.  The Security Analysis of Quantum SAGR04 Protocol in Collective-Rotation Noise Channel ∗ , 2015 .

[12]  Chien-Ping Chang,et al.  High-payload image hiding with quality recovery using tri-way pixel-value differencing , 2012, Inf. Sci..

[13]  Jing-Ming Guo,et al.  Reversible data hiding in low complexity and high quality compression scheme , 2012, Digit. Signal Process..

[14]  Pradeep M. Patil,et al.  Robust and secured image-adaptive data hiding , 2012, Digit. Signal Process..

[15]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[16]  Yu-an Tan,et al.  A methodology for determining the image base of ARM-based industrial control system firmware , 2017, Int. J. Crit. Infrastructure Prot..

[17]  Yuanzhang Li,et al.  Determining image base of firmware for ARM devices by matching literal pools , 2016, Digit. Investig..

[18]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[19]  Chin-Chen Chang,et al.  High-Capacity Reversible Data-Hiding for LZW Codes , 2010, 2010 Second International Conference on Computer Modeling and Simulation.

[20]  Shabir A. Parah,et al.  A secure and robust information hiding technique for covert communication , 2015 .

[21]  Can Zhang,et al.  Cryptographic key protection against FROST for mobile devices , 2016, Cluster Computing.

[22]  Fei Wu,et al.  Determining Image Base of Firmware Files for ARM Devices , 2016, IEICE Trans. Inf. Syst..

[23]  Chin-Chen Chang,et al.  A high-performance reversible data-hiding scheme for LZW codes , 2013, J. Syst. Softw..

[24]  Devesh Kumar Bandil,et al.  Reversible Data Hiding Techniques , 2012 .

[25]  Chin-Chen Chang,et al.  A novel data-hiding and compression scheme based on block classification of SMVQ indices , 2016, Digit. Signal Process..

[26]  Chengyun Yang,et al.  Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[27]  Wojciech Szpankowski,et al.  Error Resilient LZ'77 Data Compression: Algorithms, Analysis, and Experiments , 2007, IEEE Transactions on Information Theory.

[28]  Terry A. Welch,et al.  A Technique for High-Performance Data Compression , 1984, Computer.

[29]  Chin-Chen Chang,et al.  A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[30]  Wojciech Szpankowski,et al.  Joint source-channel LZ'77 coding , 2003, Data Compression Conference, 2003. Proceedings. DCC 2003.

[31]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[32]  Wojciech Szpankowski,et al.  Error-resilient LZW data compression , 2006, Data Compression Conference (DCC'06).