Information hiding by coverings

We propose a formal model for embedding information in black and white images and prove the equivalence between the existence of embedding schemes and covering codes. An asymptotically tight bound on the performance of embedding schemes is given. We construct efficient embedding schemes via known coverings. In particular, one of those schemes allows the embedding of up to /spl lfloor/log/sub 2/(n+1)/spl rfloor/ bits in coverwords of n bits, changing at most one bit, which is twice as good as the scheme of Y.-Y. Chen et al. (see Proc. IEEE Symp. on Computers and Communication - ISCC 2000, p.750-5, 2000). We rewrite some previous schemes with a look towards their covering structures. Finally, we address the problem of active warden in a similar way, giving a model, establishing the relationship with centered codes and concluding by a construction of schemes resistant to active warden.

[1]  M. Y. Wu,et al.  A Novel Data Embedding Method for Two-Color Facsimile Images , 1998 .

[2]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[3]  M. S. Pinsker,et al.  CENTERED ERROR-CORRECTING CODES , 1999 .

[4]  Gérard D. Cohen,et al.  Covering Codes , 2005, North-Holland mathematical library.

[5]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[6]  Yu-Chee Tseng,et al.  A secure data hiding scheme for two-color images , 2000, Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications.

[7]  S. Yau Mathematics and its applications , 2002 .

[8]  Zhaohui Wu,et al.  A Novel Data Hiding Method for Two-Color Images , 2001, ICICS.

[9]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[10]  S. G. Vladut,et al.  Algebraic-Geometric Codes , 1991 .

[11]  J. van Leeuwen,et al.  Information Hiding , 1999, Lecture Notes in Computer Science.

[12]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[13]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[14]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[15]  J. Davenport Editor , 1960 .