Abstract
This work proposes an efficient data hiding scheme for wet paper channel by using a multilayer construction, in which a number of node-bits in different layers are derived from all cover bits and used to carry the secret data. By applying the wet paper coding method to the node-bits and altering the changeable cover bits, the node-bits are modified into their desired values and the secret data are embedded in a layer-by-layer manner. An equilibration mechanism is also introduced to flip the denser changeable cover bits with higher probability. This way, paper folding method is equivalent to a special case of the proposed scheme, and a family of data hiding methods with more flexible relative payload and higher embedding efficiency can be generated.
Similar content being viewed by others
References
Wang H, Wang S (2004) Cyber warfare: steganography vs. steganalysis. Commun ACM 47(10):76–82
Fridrich J, Goljan M, Lisonek P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Proc 53(10):3923–3935
Willems F, Dijk M (2005) Capacity and codes for embedding information in gray-scale signals. IEEE Trans Inf Theory 51(3):1209–1214
Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography. Proc SPIE 6050:650502.1–15
Zhang W, Zhang X, Wang S (2008) “Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes,” in Proceedings of the 10th Information Hiding Workshop. Lect Notes Comput Sci 5284:60–71
Fridrich J (2009) Asymptotic behavior of the ZZW embedding construction. IEEE Trans Inf Forensic Secur 4(1):151–154
Zhang W, Wang X (2009) Generalization of the ZZW embedding construction for steganography. IEEE Trans Inf Forensic Secur 4(3):564–569
Fridrich J, Goljan M, Soukal D (2006) Wet paper codes with improved embedding efficiency. IEEE Trans Inf Forensic Sec 1(1):102–110
Zhang W, Zhu X (2009) Improving the embedding efficiency of wet paper codes by paper folding. IEEE Signal Proc Lett 16(9):794–797
Filler T, Fridrich J (2009) Wet ZZW construction for steganography. IEEE International Workshop on Information Forensics and Security, London
Zhang W, Liu J, Wang X, Yu N (2010) Generalization and analysis of the paper folding method for steganography. IEEE Trans Inf Forensic Sec 5(4):694–704
Filler T, Judas J, Fridrich J (2010) Minimizing embedding impact in steganography using trellis-coded quantization. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose
Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensic Sec 6(3):920–935
Acknowledgments
This work was supported by the National Natural Science Foundation of China under Grants 61073190 and 61071187, the Research Fund for the Doctoral Program of Higher Education of China under Grant 20113108110010, the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning, and Shanghai Pujiang Program under Grant 13PJ1403200.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, X., Qin, C. & Shen, L. Efficient wet paper embedding for steganography with multilayer construction. Ann. Telecommun. 69, 441–447 (2014). https://doi.org/10.1007/s12243-013-0393-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-013-0393-4