Efficient wet paper embedding for steganography with multilayer construction

This work proposes an efficient data hiding scheme for wet paper channel by using a multilayer construction, in which a number of node-bits in different layers are derived from all cover bits and used to carry the secret data. By applying the wet paper coding method to the node-bits and altering the changeable cover bits, the node-bits are modified into their desired values and the secret data are embedded in a layer-by-layer manner. An equilibration mechanism is also introduced to flip the denser changeable cover bits with higher probability. This way, paper folding method is equivalent to a special case of the proposed scheme, and a family of data hiding methods with more flexible relative payload and higher embedding efficiency can be generated.

[1]  Jessica J. Fridrich,et al.  Asymptotic Behavior of the ZZW Embedding Construction , 2009, IEEE Transactions on Information Forensics and Security.

[2]  Weiming Zhang,et al.  Improving the Embedding Efficiency of Wet Paper Codes by Paper Folding , 2009, IEEE Signal Processing Letters.

[3]  Weiming Zhang,et al.  Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.

[4]  Weiming Zhang,et al.  Generalization of the ZZW Embedding Construction for Steganography , 2009, IEEE Transactions on Information Forensics and Security.

[5]  Jessica J. Fridrich,et al.  Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.

[6]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Trans. Inf. Forensics Secur..

[7]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[8]  Jessica J. Fridrich,et al.  Minimizing embedding impact in steganography using trellis-coded quantization , 2010, Electronic Imaging.

[9]  Jessica J. Fridrich,et al.  Wet ZZW construction for steganography , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[10]  Marten van Dijk,et al.  Capacity and codes for embedding information in gray-scale signals , 2005, IEEE Transactions on Information Theory.

[11]  Weiming Zhang,et al.  Generalization and Analysis of the Paper Folding Method for Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[12]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[13]  Miroslav Goljan,et al.  Writing on wet paper , 2005 .