Skip to main content
Top
Published in: Annals of Telecommunications 7-8/2014

01-08-2014

Efficient wet paper embedding for steganography with multilayer construction

Authors: Xinpeng Zhang, Chuan Qin, Liquan Shen

Published in: Annals of Telecommunications | Issue 7-8/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This work proposes an efficient data hiding scheme for wet paper channel by using a multilayer construction, in which a number of node-bits in different layers are derived from all cover bits and used to carry the secret data. By applying the wet paper coding method to the node-bits and altering the changeable cover bits, the node-bits are modified into their desired values and the secret data are embedded in a layer-by-layer manner. An equilibration mechanism is also introduced to flip the denser changeable cover bits with higher probability. This way, paper folding method is equivalent to a special case of the proposed scheme, and a family of data hiding methods with more flexible relative payload and higher embedding efficiency can be generated.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wang H, Wang S (2004) Cyber warfare: steganography vs. steganalysis. Commun ACM 47(10):76–82CrossRef Wang H, Wang S (2004) Cyber warfare: steganography vs. steganalysis. Commun ACM 47(10):76–82CrossRef
2.
3.
go back to reference Willems F, Dijk M (2005) Capacity and codes for embedding information in gray-scale signals. IEEE Trans Inf Theory 51(3):1209–1214CrossRef Willems F, Dijk M (2005) Capacity and codes for embedding information in gray-scale signals. IEEE Trans Inf Theory 51(3):1209–1214CrossRef
4.
go back to reference Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography. Proc SPIE 6050:650502.1–15 Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography. Proc SPIE 6050:650502.1–15
5.
go back to reference Zhang W, Zhang X, Wang S (2008) “Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes,” in Proceedings of the 10th Information Hiding Workshop. Lect Notes Comput Sci 5284:60–71CrossRef Zhang W, Zhang X, Wang S (2008) “Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes,” in Proceedings of the 10th Information Hiding Workshop. Lect Notes Comput Sci 5284:60–71CrossRef
6.
go back to reference Fridrich J (2009) Asymptotic behavior of the ZZW embedding construction. IEEE Trans Inf Forensic Secur 4(1):151–154CrossRef Fridrich J (2009) Asymptotic behavior of the ZZW embedding construction. IEEE Trans Inf Forensic Secur 4(1):151–154CrossRef
7.
go back to reference Zhang W, Wang X (2009) Generalization of the ZZW embedding construction for steganography. IEEE Trans Inf Forensic Secur 4(3):564–569CrossRef Zhang W, Wang X (2009) Generalization of the ZZW embedding construction for steganography. IEEE Trans Inf Forensic Secur 4(3):564–569CrossRef
8.
go back to reference Fridrich J, Goljan M, Soukal D (2006) Wet paper codes with improved embedding efficiency. IEEE Trans Inf Forensic Sec 1(1):102–110CrossRef Fridrich J, Goljan M, Soukal D (2006) Wet paper codes with improved embedding efficiency. IEEE Trans Inf Forensic Sec 1(1):102–110CrossRef
9.
go back to reference Zhang W, Zhu X (2009) Improving the embedding efficiency of wet paper codes by paper folding. IEEE Signal Proc Lett 16(9):794–797CrossRef Zhang W, Zhu X (2009) Improving the embedding efficiency of wet paper codes by paper folding. IEEE Signal Proc Lett 16(9):794–797CrossRef
10.
go back to reference Filler T, Fridrich J (2009) Wet ZZW construction for steganography. IEEE International Workshop on Information Forensics and Security, London Filler T, Fridrich J (2009) Wet ZZW construction for steganography. IEEE International Workshop on Information Forensics and Security, London
11.
go back to reference Zhang W, Liu J, Wang X, Yu N (2010) Generalization and analysis of the paper folding method for steganography. IEEE Trans Inf Forensic Sec 5(4):694–704CrossRef Zhang W, Liu J, Wang X, Yu N (2010) Generalization and analysis of the paper folding method for steganography. IEEE Trans Inf Forensic Sec 5(4):694–704CrossRef
12.
go back to reference Filler T, Judas J, Fridrich J (2010) Minimizing embedding impact in steganography using trellis-coded quantization. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose Filler T, Judas J, Fridrich J (2010) Minimizing embedding impact in steganography using trellis-coded quantization. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose
13.
go back to reference Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensic Sec 6(3):920–935CrossRef Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensic Sec 6(3):920–935CrossRef
Metadata
Title
Efficient wet paper embedding for steganography with multilayer construction
Authors
Xinpeng Zhang
Chuan Qin
Liquan Shen
Publication date
01-08-2014
Publisher
Springer Paris
Published in
Annals of Telecommunications / Issue 7-8/2014
Print ISSN: 0003-4347
Electronic ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-013-0393-4

Other articles of this Issue 7-8/2014

Annals of Telecommunications 7-8/2014 Go to the issue

Premium Partner