Exploiting error control in matrix coding-based data hiding over lossy channel

Journal of Real-Time Image Processing - Tập 16 - Trang 577-588 - 2018
Ching-Nung Yang1, Yung-Shun Chou1, Yanxiao Liu2, Cheonshik Kim3
1Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien, Taiwan
2Department of Computer Science and Engineering, XI'AN University of Technology, XI'AN, China
3Department of Computer Engineering, Sejong University, Seoul, Republic of Korea

Tóm tắt

A steganographic scheme, matrix coding-based data hiding (MCDH), is constructed from covering function to enhance embedding efficiency, and, meanwhile, decrease the required changed bits. However, the MCDH may be compromised when using it as steganography over lossy channel. In this paper, we consider the so-called error spreading problem that one-bit error in MCDH may give rise to multi-bit errors when extracting the hidden data. In this paper, we present new MCDH to overcome error spreading problem based on constant weight code. Our new approach uses small lookup table to reduce embedding/extracting complexity. Experimental results demonstrate a better performance than previously proposed MCDHs in terms of spreading errors against lossy channel.

Tài liệu tham khảo

Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data. IEEE Signal Process. Magn. 17(5), 20–46 (2000) Podilchuk, C.I., Delp, E.J.: Digial watermarking: algorithms and applications. IEEE Signal Process. Magn. 18(4), 33–46 (2001) Kim, C.: Data hiding by an improved exploiting modification direction. Multimed. Tools Appl. 69(3), 569–584 (2014) Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3.4), 313–336 (1996) Qin, C., Chang, C.C., Chiu, Y.P.: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969–978 (2014) Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Privacy 1(3), 32–44 (2003) Zhang, Y., Qin, C., Zhang, W., Liu, F., Luo, X.: On the fault-tolerant performance for a class of robust image steganography. Signal Process 146, 99–111 (2018) Zhang, X., Qian, Z., Feng, G., Ren, Y.: Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Rep. 25(2), 322–328 (2014) Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014) Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools Appl. 75(4), 1947–1962 (2016) Ma, Y., Luo, X., Li, X., Bao, Z., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set \(\alpha\)-positive region reduction. IEEE Trans. Circ. Syst. Video Technol. (2018). https://doi.org/10.1109/TCSVT.2018.2799243 Mielikainen, J.: LSB matching revisited. IEEE Signal Proc. Lett. 13(2), 285–287 (2006) Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Information Theory Workshop (ITW), 2003 IEEE conference. IEEE, Paris, pp. 151–154 (2003) Willems, F., Dijk, M.: Capacity and codes for embedding information in gray-scale signals. IEEE Trans. Inf. Theory 51(3), 1209–1214 (2005) Bierbrauer, J., Fridrich, J.: Constructing good covering codes for applications in steganography. LNCS Trans. Data Hiding Multimed. Secur. 4920, 1–22 (2008) Crandall, R.: Some notes on steganography, pp. 1–6 (1998). http://dde.binghamton.edu/download/Crandall_matrix.pdf. Accessed 31 May 2018 Westfeld, A.: F5: a steganographic algorithm. In: Information Hiding. IH 2001. Lecture Notes in Computer Science, 2137, Springer, Berlin, pp. 289–302 (2004) Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006) Fridrich, J., Lisonek, P.: Grid coloring in steganography. IEEE Trans. Inf. Theory 53(4), 1547–1549 (2007) Zhang, W., Wang, S., Zhang, X.: Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun. Lett. 11(8), 680–682 (2007) Fisk, G., Fisk, M., Papadopoulos, C., Neil, J.: Eliminating steganography in Internet traffic with active wardens. In: Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, 2578, pp. 18–35 (2002), Wang, J., Ni, J., Lu, Z.: Hybrid matrix coding and error-correction coding scheme for reversible data hiding in binary VQ index codestream. Int. J. Innov. Comput. I. 9(6), 2521–2531 (2013) Zhang, X., Wang, S.: Stego-encoding with error correction capability. IEICE Trans. Fundam E88–A, 3663–3667 (2005) Yang, C.N., Chen, G.J., Chen, T.S., Lukac, R.: Error spreading control in image steganographic embedding schemes using unequal error protection. J. Image Sci. Technol. 51(4), 380–385 (2007) Gore, W., Kilgus, C.: Cyclic codes with unequal error protection. IEEE Trans. Inf. Theory 17(2), 214–215 (1971) Boros, G., Moll, V.: Irresistible Integrals: Symbolics, Analysis and Experiments in the Evaluation of Integrals. Cambridge University Press, Cambridge (2004) Stanley, C.A.: Pairs of Values and the Chi-square Attack. Iowa State University, Ames (2005)