Graph realization of reed-muller codes for data hiding

In recent years the information industry develops vigorously and the progress in technology results in thriving augmentation of internet and people pass messages mutually through network in large number and triggers the issue of information security. In order to protect the safety and reliability of message passing, the development of steganography is thereby generated. In this research we will aim at its embedding and the major point of investigation is how to ensure the quality of the host after embedding secret message that means how to lower its distortion. On the other hand we want to increase the embedding efficiency and in this way we can send much more messages. At the same time we also have to consider the problem of complexity as too complicated algorithm is not feasible. This thesis is data hiding of binary host image and the Reed-Muller Codes of linear block codes in the error-correcting codes is applied to conduct research on steganography. Decoding algorithm is presented to conduct simulation analysis and discussion aiming at the embedding rate and embedding efficiency.

[1]  Weiming Zhang,et al.  A coding problem in steganography , 2008, Des. Codes Cryptogr..

[2]  Jessica J. Fridrich,et al.  On Steganographic Embedding Efficiency , 2006, Information Hiding.

[3]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[4]  M.A. Khojastepour,et al.  Code design for the relay channel and factor graph decoding , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[5]  Frank R. Kschischang Codes defined on graphs , 2003, IEEE Commun. Mag..

[6]  Yu-Chee Tseng,et al.  A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..

[7]  Petr Lisonek,et al.  Linear codes for high payload steganography , 2009, Discret. Appl. Math..

[8]  Kenneth G. Paterson,et al.  Efficient Decoding Algorithms for Generalised Reed-Muller Codes , 1998 .

[9]  Peter Hauck,et al.  Efficient Majority-Logic Decoding of Short-Length Reed-Muller Codes at Information Positions , 2013, IEEE Transactions on Communications.

[10]  Jim Reeds Solved: the Ciphers in Book III of Trithemius's Steganographia , 1998, Cryptologia.

[11]  Brendan J. Frey,et al.  Factor graphs and the sum-product algorithm , 2001, IEEE Trans. Inf. Theory.

[12]  H.-A. Loeliger,et al.  An introduction to factor graphs , 2004, IEEE Signal Process. Mag..