Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography

作者: Anindya Sarkar , Upamanyu Madhow , B S Manjunath

DOI: 10.1109/TIFS.2010.2046218

关键词:

摘要: In matrix embedding (ME)-based steganography, the host coefficients are minimally perturbed such that transmitted bits fall in a coset of linear code, with syndrome conveying hidden bits. The corresponding distortion and vulnerability to steganalysis significantly less than conventional quantization index modulation (QIM)-based hiding. However, ME is robust attacks, single bit error leading multiple decoding errors for this paper, we employ ME-RA scheme, combination ME-based hiding powerful repeat accumulate (RA) codes correction, address problem. A key contribution paper compute log likelihood ratios RA decoding, taking into account many-to-one mapping between an encoded bit, ME. To reduce detectability, hide randomized blocks, as recently proposed Yet Another Steganographic Scheme (YASS), replacing QIM-based YASS by scheme. We also show performance can be improved employing punctured codes. Through experiments based on couple thousand images, same embedded data rate moderate attack level, method results lower detection obtained YASS.

参考文章(31)
D. Divsalar, Hui Jin, Robert J McEliece, Coding theorems for 'turbo-like' codes Proc. 36th Allerton Conf. on Communication, Control, and Computing, Allerton, Illinois, September 1998. ,(1998)
Byung-Joo Kim, Chang-Bum Lee, Il-Kon Kim, A Robust Realtime Surveillance System Lecture Notes in Computer Science. pp. 314- 321 ,(2006) , 10.1007/11815921_34
Younhee Kim, Zoran Duric, Dana Richards, Modified matrix encoding technique for minimal distortion steganography information hiding. pp. 314- 327 ,(2006) , 10.1007/978-3-540-74124-4_21
Andreas Westfeld, F5-A Steganographic Algorithm information hiding. ,vol. 2137, pp. 289- 302 ,(2001) , 10.1007/3-540-45496-9_21
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath, YASS: yet another steganographic scheme that resists blind steganalysis information hiding. ,vol. 4567, pp. 16- 31 ,(2007) , 10.1007/978-3-540-77370-2_2
Michael Backes, Christian Cachin, None, Public-Key Steganography with Active Attacks Theory of Cryptography. pp. 210- 226 ,(2005) , 10.1007/978-3-540-30576-7_12
Yun Q. Shi, Chunhua Chen, Wen Chen, A Markov process based approach to effective attacking JPEG steganography information hiding. pp. 249- 264 ,(2006) , 10.1007/978-3-540-74124-4_17