Skip to main content
Log in

A coding problem in steganography

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

To study how to design a steganographic algorithm more efficiently, a new coding problem—steganographic codes (abbreviated stego-codes)—is presented in this paper. The stego-codes are defined over the field with q(q ≥ 2) elements. A method of constructing linear stego-codes is proposed by using the direct sum of vector subspaces. And the problem of linear stego-codes is converted to an algebraic problem by introducing the concept of the tth dimension of a vector space. Some bounds on the length of stego-codes are obtained, from which the maximum length embeddable (MLE) code arises. It is shown that there is a corresponding relation between MLE codes and perfect error-correcting codes. Furthermore the classification of all MLE codes and a lower bound on the number of binary MLE codes are obtained based on the corresponding results on perfect codes. Finally hiding redundancy is defined to value the performance of stego-codes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Crandall R.: Some notes on steganography. Available: http://os.inf.tu-dresden.de/~westfeld/crandall.pdf (1998). Accessed August 2007

  2. Fridrich J., Goljan M. (2004). On estimation of secret message length in LSB steganography in spatial domain. Proceedings of SPIE-Security. Steganography and Watermarking of Multimedia Contents VI 5306, 23–34

    Google Scholar 

  3. Fridrich J., Goljan M., Soukal D.: Searching for the stego key. In: Proceedings of SPIE-Security, Steganography and Watermarking of Multimedia Contents VI, Electronic Imaging 5306, 70–82 (2004).

  4. Chen Y.Y., Pan H.K., Tseng Y.C.: A secure data hiding scheme for two color images. In IEEE Symposium On Computer and Communications (2000) Available: http://www.csie.nctu.edu.tw/yctseng. Accessed May 2005

  5. Tseng Y.C., Pan H.K. (2002). Data hiding in 2-color images. IEEE Trans. Comput. 51(7): 873–890

    Article  MathSciNet  Google Scholar 

  6. Westfeld A.: F5: a steganographic algorithm, high capacity despite better steganalysis. Proceedings of 4th International Workshop on Information Hiding. LNCS 2137, 289–302 (2001).

  7. MacWilliams F.J., Sloane N.J.A. (1977) The theory ofÿ Error-Correcting Codes. North-Holland Publishing Company, Amsterdam

    Google Scholar 

  8. Tietäväinen A. (1973). On the nonexistence of perfect codes over finite fields. SIAM J. Appl. Math. 24: 88–96

    Article  MathSciNet  Google Scholar 

  9. Krotov D.S. (2000). Lower bounds on the number of m-quasigroups of order 4 and the number of perfect binary codes. Discrete Anal. Oper. Res. 1(7) 2: 47–53

    MathSciNet  Google Scholar 

  10. Moulin P., O’Sullivan J.A. (2003). Information theoretic analysis of information hiding. IEEE Trans. Inform Theory, 49(3): 563–593

    Article  MATH  MathSciNet  Google Scholar 

  11. Moulin P., Wang Y.: New results on steganographic capacity. Proceeding of CISS 2004. University of Princeton, Princeton, New Jersey (2004). Available: http://www.ifp.uiuc.edu/~ywang11/paper/CISS04_204.pdf. Accessed August 2007

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weiming Zhang.

Additional information

Communicated by P. Wild.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, W., Li, S. A coding problem in steganography. Des. Codes Cryptogr. 46, 67–81 (2008). https://doi.org/10.1007/s10623-007-9135-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-007-9135-9

Keywords

AMS Classification

Navigation