Steganography Combining Data Decomposition Mechanism and Stego-coding Method

A novel steganographic scheme based on data decomposition and stego-coding mechanisms is proposed. In this scheme, a secret message is represented as a sequence of digits in a notational system with a prime base. Each digit block is decomposed into a number of shares. By using stego-coding technique, these shares are then embedded in different cover images respectively. In each cover, a share is carried by a group of cover pixels and, at most, only one pixel in the group is increased or decreased by a small magnitude. That implies a high embedding efficiency, and therefore distortion introduced to the covers is low, leading to enhanced imperceptibility of the secret message. A further advantage of the scheme is that, even a part of stego-images are lost during transmission, the receiver can still extract embedded messages from the surviving covers. Povzetek: Predstavljena je nova steganografska metoda.

[1]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[2]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[3]  Weiming Zhang,et al.  A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.

[4]  Jessica J. Fridrich,et al.  Grid Colorings in Steganography , 2007, IEEE Transactions on Information Theory.

[5]  Xinpeng Zhang,et al.  Efficient double-layered steganographic embedding , 2007 .

[6]  Xinpeng Zhang,et al.  Integrated encoding with high efficiency for digital steganography , 2007 .

[7]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[9]  Xinpeng Zhang,et al.  Dynamical running coding in digital steganography , 2006, IEEE Signal Processing Letters.

[10]  Marten van Dijk,et al.  Embedding Information in Grayscale Images , 2001 .

[11]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[12]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.