Abstract
In this paper, a high dimensional reference table-based embedding is proposed for steganography. It employs an \(N\)-length cover vector to embed \(B(K,N)\)-ary notational digits, which causes a Euclidean distance-based distortion no more than \(K\). By choosing the appropriate values of \(K\) and \(N\), a embedding strategy suitable for arbitrary relative capacity can be achieved. Further, we introduce the One-by-One Search Algorithm (OOSA) to optimize the mapping function, which maps the elements in the codeword set to those in the neighborhood set. Due to the high dimensional embedding, the proposed scheme provides a higher embedding efficiency or relative capacity compared with other similar approaches. Experiments on both grayscale images and H.264 video show the effectiveness of the proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Westfeld, A.: F5-A steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, p. 273. Springer, Heidelberg (1998)
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768. Springer, Heidelberg (2000)
Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13, 285–287 (2006)
Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)
Chao, R.M., Wu, H.C., Lee, C.C., Chu, Y.P.: A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Secur. 2009, 1–9 (2009)
Hong, W., Chen, T.S.: A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. 7(1), 176–184 (2012)
Yang, C.H.: Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recogn. 41(8), 2674–2683 (2008)
Hong, W.: Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf. Sci. 221, 473–489 (2013)
Wang, J., Sun, Y., Xu, H., Chen, K., Kim, H.J., Joo, S.H.: An improved section-wise exploiting modification direction method. Signal Process. 90(11), 2954–2964 (2010)
Schönfeld, D., Winkler, A.: Embedding with syndrome coding based on BCH codes. In: Proceedings of the 8th Workshop on Multimedia and Security, pp. 214–223. ACM (2006)
Munuera, C.: 3. In: Algebraic Geometry Modelling in Information Theory. Coding Theory and Cryptology, vol. 8, p. 83. World Scientific Publishing Co., Pte. Ltd., February 2013
Bierbrauer, J., Fridrich, J.: Constructing good covering codes for applications in steganography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security III. LNCS, vol. 4920, pp. 1–22. Springer, Heidelberg (2008)
Pevný, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215–224 (2010)
Fridrich, J.J., Kodovský, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)
Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010)
Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)
Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE International Workshop on Information Forensics and Security (WIFS), 2012, pp. 234–239. IEEE (2012)
Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the first ACM Workshop on Information Hiding and Multimedia Security, pp. 59–68. ACM (2013)
Fridrich, J., Goljan, M., Lisoněk, P., Soukal, D.: Writing on wet paper. In: Delp, E.J., Wong, P.W., (eds.) Proceedings of SPIE on Security, Steganography, and Watermarking of Multimedia Contents. vol. 5681, pp. 328–340. SPIE, San Jose, September 2005
Tew, Y., Wong, K.: An overview of information hiding in H.264/AVC compressed video. IEEE Trans. Circuits Syst. Video Technol. 24(2), 305–319 (2014)
Vasic, B., Vasic, B.: Simplification resilient LDPC-coded sparse-QIM watermarking for 3D-meshes. IEEE Trans. Multimedia 15(7), 1532–1542 (2013)
Ibaida, A., Khalil, I.: Wavelet based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Trans. Biomed. Eng. 60(12), 3322–3330 (2013)
Anderson, R.J., Petitcolas, F.A.: On the limits of steganography. IEEE J. Sel. Areas Commun. 16(4), 474–481 (1998)
Bas, P., Filler, T., Pevný, T.: “Break Our Steganographic System”: The ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011)
Recommendation, I.T.U.T. H 264: Advanced video coding for generic audiovisual services. ITU-T Rec. H 264, pp. 14496–14510 (2003)
Zhu, H., Wang, R., Xu, D.: Information hiding algorithm for H.264 based on the motion estimation of quarter-pixel. In: 2nd International Conference on Future Computer and Communication (ICFCC), 2010. vol.1, pp. 423–427. IEEE (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Feng, B., Lu, W., Dai, ., Sun, W. (2015). Steganography Based on High-Dimensional Reference Table. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_44
Download citation
DOI: https://doi.org/10.1007/978-3-319-19321-2_44
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19320-5
Online ISBN: 978-3-319-19321-2
eBook Packages: Computer ScienceComputer Science (R0)