Skip to main content
Log in

Efficient wet paper embedding for steganography with multilayer construction

  • Published:
annals of telecommunications - annales des télécommunications Aims and scope Submit manuscript

Abstract

This work proposes an efficient data hiding scheme for wet paper channel by using a multilayer construction, in which a number of node-bits in different layers are derived from all cover bits and used to carry the secret data. By applying the wet paper coding method to the node-bits and altering the changeable cover bits, the node-bits are modified into their desired values and the secret data are embedded in a layer-by-layer manner. An equilibration mechanism is also introduced to flip the denser changeable cover bits with higher probability. This way, paper folding method is equivalent to a special case of the proposed scheme, and a family of data hiding methods with more flexible relative payload and higher embedding efficiency can be generated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Wang H, Wang S (2004) Cyber warfare: steganography vs. steganalysis. Commun ACM 47(10):76–82

    Article  Google Scholar 

  2. Fridrich J, Goljan M, Lisonek P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Proc 53(10):3923–3935

    Article  MathSciNet  Google Scholar 

  3. Willems F, Dijk M (2005) Capacity and codes for embedding information in gray-scale signals. IEEE Trans Inf Theory 51(3):1209–1214

    Article  Google Scholar 

  4. Fridrich J, Filler T (2007) Practical methods for minimizing embedding impact in steganography. Proc SPIE 6050:650502.1–15

    Google Scholar 

  5. Zhang W, Zhang X, Wang S (2008) “Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes,” in Proceedings of the 10th Information Hiding Workshop. Lect Notes Comput Sci 5284:60–71

    Article  Google Scholar 

  6. Fridrich J (2009) Asymptotic behavior of the ZZW embedding construction. IEEE Trans Inf Forensic Secur 4(1):151–154

    Article  Google Scholar 

  7. Zhang W, Wang X (2009) Generalization of the ZZW embedding construction for steganography. IEEE Trans Inf Forensic Secur 4(3):564–569

    Article  Google Scholar 

  8. Fridrich J, Goljan M, Soukal D (2006) Wet paper codes with improved embedding efficiency. IEEE Trans Inf Forensic Sec 1(1):102–110

    Article  Google Scholar 

  9. Zhang W, Zhu X (2009) Improving the embedding efficiency of wet paper codes by paper folding. IEEE Signal Proc Lett 16(9):794–797

    Article  Google Scholar 

  10. Filler T, Fridrich J (2009) Wet ZZW construction for steganography. IEEE International Workshop on Information Forensics and Security, London

    Google Scholar 

  11. Zhang W, Liu J, Wang X, Yu N (2010) Generalization and analysis of the paper folding method for steganography. IEEE Trans Inf Forensic Sec 5(4):694–704

    Article  Google Scholar 

  12. Filler T, Judas J, Fridrich J (2010) Minimizing embedding impact in steganography using trellis-coded quantization. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose

    Google Scholar 

  13. Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensic Sec 6(3):920–935

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grants 61073190 and 61071187, the Research Fund for the Doctoral Program of Higher Education of China under Grant 20113108110010, the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning, and Shanghai Pujiang Program under Grant 13PJ1403200.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinpeng Zhang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, X., Qin, C. & Shen, L. Efficient wet paper embedding for steganography with multilayer construction. Ann. Telecommun. 69, 441–447 (2014). https://doi.org/10.1007/s12243-013-0393-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-013-0393-4

Keywords

Navigation