Skip to main content
Log in

Exploiting error control in matrix coding-based data hiding over lossy channel

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

A steganographic scheme, matrix coding-based data hiding (MCDH), is constructed from covering function to enhance embedding efficiency, and, meanwhile, decrease the required changed bits. However, the MCDH may be compromised when using it as steganography over lossy channel. In this paper, we consider the so-called error spreading problem that one-bit error in MCDH may give rise to multi-bit errors when extracting the hidden data. In this paper, we present new MCDH to overcome error spreading problem based on constant weight code. Our new approach uses small lookup table to reduce embedding/extracting complexity. Experimental results demonstrate a better performance than previously proposed MCDHs in terms of spreading errors against lossy channel.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data. IEEE Signal Process. Magn. 17(5), 20–46 (2000)

    Article  Google Scholar 

  2. Podilchuk, C.I., Delp, E.J.: Digial watermarking: algorithms and applications. IEEE Signal Process. Magn. 18(4), 33–46 (2001)

    Article  Google Scholar 

  3. Kim, C.: Data hiding by an improved exploiting modification direction. Multimed. Tools Appl. 69(3), 569–584 (2014)

    Article  Google Scholar 

  4. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3.4), 313–336 (1996)

    Article  Google Scholar 

  5. Qin, C., Chang, C.C., Chiu, Y.P.: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969–978 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  6. Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Privacy 1(3), 32–44 (2003)

    Article  Google Scholar 

  7. Zhang, Y., Qin, C., Zhang, W., Liu, F., Luo, X.: On the fault-tolerant performance for a class of robust image steganography. Signal Process 146, 99–111 (2018)

    Article  Google Scholar 

  8. Zhang, X., Qian, Z., Feng, G., Ren, Y.: Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Rep. 25(2), 322–328 (2014)

    Article  Google Scholar 

  9. Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)

    Article  Google Scholar 

  10. Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools Appl. 75(4), 1947–1962 (2016)

    Article  Google Scholar 

  11. Ma, Y., Luo, X., Li, X., Bao, Z., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set \(\alpha\)-positive region reduction. IEEE Trans. Circ. Syst. Video Technol. (2018). https://doi.org/10.1109/TCSVT.2018.2799243

  12. Mielikainen, J.: LSB matching revisited. IEEE Signal Proc. Lett. 13(2), 285–287 (2006)

    Article  Google Scholar 

  13. Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Information Theory Workshop (ITW), 2003 IEEE conference. IEEE, Paris, pp. 151–154 (2003)

  14. Willems, F., Dijk, M.: Capacity and codes for embedding information in gray-scale signals. IEEE Trans. Inf. Theory 51(3), 1209–1214 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  15. Bierbrauer, J., Fridrich, J.: Constructing good covering codes for applications in steganography. LNCS Trans. Data Hiding Multimed. Secur. 4920, 1–22 (2008)

    Article  Google Scholar 

  16. Crandall, R.: Some notes on steganography, pp. 1–6 (1998). http://dde.binghamton.edu/download/Crandall_matrix.pdf. Accessed 31 May 2018

  17. Westfeld, A.: F5: a steganographic algorithm. In: Information Hiding. IH 2001. Lecture Notes in Computer Science, 2137, Springer, Berlin, pp. 289–302 (2004)

  18. Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)

    Article  Google Scholar 

  19. Fridrich, J., Lisonek, P.: Grid coloring in steganography. IEEE Trans. Inf. Theory 53(4), 1547–1549 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  20. Zhang, W., Wang, S., Zhang, X.: Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun. Lett. 11(8), 680–682 (2007)

    Article  Google Scholar 

  21. Fisk, G., Fisk, M., Papadopoulos, C., Neil, J.: Eliminating steganography in Internet traffic with active wardens. In: Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, 2578, pp. 18–35 (2002),

  22. Wang, J., Ni, J., Lu, Z.: Hybrid matrix coding and error-correction coding scheme for reversible data hiding in binary VQ index codestream. Int. J. Innov. Comput. I. 9(6), 2521–2531 (2013)

    Google Scholar 

  23. Zhang, X., Wang, S.: Stego-encoding with error correction capability. IEICE Trans. Fundam E88–A, 3663–3667 (2005)

    Article  Google Scholar 

  24. Yang, C.N., Chen, G.J., Chen, T.S., Lukac, R.: Error spreading control in image steganographic embedding schemes using unequal error protection. J. Image Sci. Technol. 51(4), 380–385 (2007)

    Article  Google Scholar 

  25. Gore, W., Kilgus, C.: Cyclic codes with unequal error protection. IEEE Trans. Inf. Theory 17(2), 214–215 (1971)

    Article  MATH  Google Scholar 

  26. Boros, G., Moll, V.: Irresistible Integrals: Symbolics, Analysis and Experiments in the Evaluation of Integrals. Cambridge University Press, Cambridge (2004)

    Book  MATH  Google Scholar 

  27. Stanley, C.A.: Pairs of Values and the Chi-square Attack. Iowa State University, Ames (2005)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by Ministry of Science and Technology (MOST), under Grant 1072221E259007. This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by (2012R1A1A2002345, 2015R1D1A1A01059253), and was supported under the framework of international cooperation program managed by NRF (2016K2A9A2A05005255).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheonshik Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, CN., Chou, YS., Liu, Y. et al. Exploiting error control in matrix coding-based data hiding over lossy channel. J Real-Time Image Proc 16, 577–588 (2019). https://doi.org/10.1007/s11554-018-0829-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-018-0829-1

Keywords

Navigation