Special Issue: Information Security of Multimedia Contents

Plus-Minus One Modified Product Steganographic Coding Based on Extended Embeddable Columns

Expand
  • 1. School of Computer and Communication Engineering, Liaoning Shihua University, Fushun 113001, Liaoning Province, China;
    2. The State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China

Received date: 2016-07-29

  Revised date: 2016-08-16

  Online published: 2016-09-30

Abstract

In the existing product coding technique, secret data are embedded into rows and columns of a particular Hamming code matrix in a sequential fashion using the (n, k) linear block codes generated with a parity-check matrix H. The product code is a type of parallel concatenated block code that uses short codes to construct a long code. In decoding, a relatively simple iterative technique is used. This paper proposes a novel algorithm of ±1 modified product steganographic code (±1 MPSC) by expending some embeddable columns. Compared with the product perfect code (PPC), ±1 MPSC uses 2c-1-1 additional columns where c is the column number of the Hamming code matrix. It also uses a XOR data list constructed by LSB and second LSB of adjacent carrier elements to further reduce the number of flips to improve embedding efficiency. The theoretical analysis and experiments show that the embedding rate of the proposed method reaches 1.33 times that of PPC, and the total performance of D-E curve is improved nearly 2%.

Cite this article

ZHANG Ling-yu, ZHAO Xian-feng . Plus-Minus One Modified Product Steganographic Coding Based on Extended Embeddable Columns[J]. Journal of Applied Sciences, 2016 , 34(5) : 575 -584 . DOI: 10.3969/j.issn.0255-8297.2016.05.010

References

[1] Westfeld A. 2001. F5-a stegonagraphic algorithm: high capacity despite better steganalysis[C]//Information Hiding, 4th International Workshop I. S. Moskowitz, Ed. New York, Springer-Verlag, Lecture Notes Comput. Science 2001, 2137: 289-302.
[2] Fridrich J, Soukal D. 2006. Matrix embedding for large payloads [J]. IEEE Transactions Information Security Forensics, 2006, 1(3): 390-395.
[3] Galand F, Kabatiansky G. Information hiding by coverings [C]//Proceedings of the IEEE Information Theory Workshop, Paris, 2003: 151-154.
[4] Fridrich J, Goljan M, Lisonek P, Soukal D. Writing on wet paper [J]. IEEE Transections Signal Process, 2005, 53(10): 3923-3935.
[5] 朱雪秀, 刘九芬, 张卫明. 一种基于汉明码和湿纸码的隐写算法[J]. 电子与信息学报,2010, 32(1): 162-165. Zhu X X, Liu J F, Zhang W M. A steganographic algorithm based on Hamming code and wet paper code [J], Journal of Electronics & Information Technology, 2010, 32(1): 162-165. (in Chinese)
[6] Rifa-Pous H, Rifa J. 2009. Product perfect codes and steganograph [J]. Digital Signal Processing, 2009, 19(4): 764-769.
[7] Zhao Z, Gao F. An improved steganographic method of product perfect codes [C]//In proceedings of Signal Processing, Communication and Computing (ICSPCC), Xian, 2011: 1-5.
[8] Bao Z K, ZhangWM, Zhao X F. ±1 steganographic codes by applying Syndrome-Trellis codes to dynamic distortion model in pixel chain [J]. Journal of Computer Research and Development, 51(8), 2014.
[9] Filler T, Judas J, Fridrich J. Minimizing embedding impact in steganography using trelliscoded quantization [C]//Proceeding of Electronic Imaging, Media watermarking, Security and Forensics ceedings, 2010, 6(1): 175-178.
[10] Pevny T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography [C]//Proceedings of Information Hiding, 2010: 161-177.
[11] Holub V, Fridrich J. Digital image steganography using universal distortion [C]//Proceedings of Information Hiding and Multimedia Security, 2013: 59-68.
[12] Zhou P, Nadeem T, Kang P. EZCab: a cab booking application using short-range wireless communication [C]//Proceedings of IEEE International Conference on Pervasive Computing and Communications, 2015: 27-38.
[13] Li C, Hutchins D A, Green R J. Short-range ultrasonic digital communications in air [J], IEEE Trans on Ultrasonic, Ferroelectrics and Frequency Control, 2008, 55(4): 908-918.

Outlines

/