Abstract
A steganographic scheme, matrix coding-based data hiding (MCDH), is constructed from covering function to enhance embedding efficiency, and, meanwhile, decrease the required changed bits. However, the MCDH may be compromised when using it as steganography over lossy channel. In this paper, we consider the so-called error spreading problem that one-bit error in MCDH may give rise to multi-bit errors when extracting the hidden data. In this paper, we present new MCDH to overcome error spreading problem based on constant weight code. Our new approach uses small lookup table to reduce embedding/extracting complexity. Experimental results demonstrate a better performance than previously proposed MCDHs in terms of spreading errors against lossy channel.
Similar content being viewed by others
References
Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data. IEEE Signal Process. Magn. 17(5), 20–46 (2000)
Podilchuk, C.I., Delp, E.J.: Digial watermarking: algorithms and applications. IEEE Signal Process. Magn. 18(4), 33–46 (2001)
Kim, C.: Data hiding by an improved exploiting modification direction. Multimed. Tools Appl. 69(3), 569–584 (2014)
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3.4), 313–336 (1996)
Qin, C., Chang, C.C., Chiu, Y.P.: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969–978 (2014)
Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Privacy 1(3), 32–44 (2003)
Zhang, Y., Qin, C., Zhang, W., Liu, F., Luo, X.: On the fault-tolerant performance for a class of robust image steganography. Signal Process 146, 99–111 (2018)
Zhang, X., Qian, Z., Feng, G., Ren, Y.: Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Rep. 25(2), 322–328 (2014)
Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)
Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools Appl. 75(4), 1947–1962 (2016)
Ma, Y., Luo, X., Li, X., Bao, Z., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set \(\alpha\)-positive region reduction. IEEE Trans. Circ. Syst. Video Technol. (2018). https://doi.org/10.1109/TCSVT.2018.2799243
Mielikainen, J.: LSB matching revisited. IEEE Signal Proc. Lett. 13(2), 285–287 (2006)
Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Information Theory Workshop (ITW), 2003 IEEE conference. IEEE, Paris, pp. 151–154 (2003)
Willems, F., Dijk, M.: Capacity and codes for embedding information in gray-scale signals. IEEE Trans. Inf. Theory 51(3), 1209–1214 (2005)
Bierbrauer, J., Fridrich, J.: Constructing good covering codes for applications in steganography. LNCS Trans. Data Hiding Multimed. Secur. 4920, 1–22 (2008)
Crandall, R.: Some notes on steganography, pp. 1–6 (1998). http://dde.binghamton.edu/download/Crandall_matrix.pdf. Accessed 31 May 2018
Westfeld, A.: F5: a steganographic algorithm. In: Information Hiding. IH 2001. Lecture Notes in Computer Science, 2137, Springer, Berlin, pp. 289–302 (2004)
Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)
Fridrich, J., Lisonek, P.: Grid coloring in steganography. IEEE Trans. Inf. Theory 53(4), 1547–1549 (2007)
Zhang, W., Wang, S., Zhang, X.: Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun. Lett. 11(8), 680–682 (2007)
Fisk, G., Fisk, M., Papadopoulos, C., Neil, J.: Eliminating steganography in Internet traffic with active wardens. In: Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, 2578, pp. 18–35 (2002),
Wang, J., Ni, J., Lu, Z.: Hybrid matrix coding and error-correction coding scheme for reversible data hiding in binary VQ index codestream. Int. J. Innov. Comput. I. 9(6), 2521–2531 (2013)
Zhang, X., Wang, S.: Stego-encoding with error correction capability. IEICE Trans. Fundam E88–A, 3663–3667 (2005)
Yang, C.N., Chen, G.J., Chen, T.S., Lukac, R.: Error spreading control in image steganographic embedding schemes using unequal error protection. J. Image Sci. Technol. 51(4), 380–385 (2007)
Gore, W., Kilgus, C.: Cyclic codes with unequal error protection. IEEE Trans. Inf. Theory 17(2), 214–215 (1971)
Boros, G., Moll, V.: Irresistible Integrals: Symbolics, Analysis and Experiments in the Evaluation of Integrals. Cambridge University Press, Cambridge (2004)
Stanley, C.A.: Pairs of Values and the Chi-square Attack. Iowa State University, Ames (2005)
Acknowledgements
This work was supported in part by Ministry of Science and Technology (MOST), under Grant 1072221E259007. This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by (2012R1A1A2002345, 2015R1D1A1A01059253), and was supported under the framework of international cooperation program managed by NRF (2016K2A9A2A05005255).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, CN., Chou, YS., Liu, Y. et al. Exploiting error control in matrix coding-based data hiding over lossy channel. J Real-Time Image Proc 16, 577–588 (2019). https://doi.org/10.1007/s11554-018-0829-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-018-0829-1