Exploiting error control in matrix coding-based data hiding over lossy channel

被引:0
作者
Ching-Nung Yang
Yung-Shun Chou
Yanxiao Liu
Cheonshik Kim
机构
[1] National Dong Hwa University,Department of Computer Science and Information Engineering
[2] XI’AN University of Technology,Department of Computer Science and Engineering
[3] Sejong University,Department of Computer Engineering
来源
Journal of Real-Time Image Processing | 2019年 / 16卷
关键词
Steganography; Data hiding; Matrix coding; Hamming code; UEP code;
D O I
暂无
中图分类号
学科分类号
摘要
A steganographic scheme, matrix coding-based data hiding (MCDH), is constructed from covering function to enhance embedding efficiency, and, meanwhile, decrease the required changed bits. However, the MCDH may be compromised when using it as steganography over lossy channel. In this paper, we consider the so-called error spreading problem that one-bit error in MCDH may give rise to multi-bit errors when extracting the hidden data. In this paper, we present new MCDH to overcome error spreading problem based on constant weight code. Our new approach uses small lookup table to reduce embedding/extracting complexity. Experimental results demonstrate a better performance than previously proposed MCDHs in terms of spreading errors against lossy channel.
引用
收藏
页码:577 / 588
页数:11
相关论文
共 56 条
  • [1] Langelaar GC(2000)Watermarking digital image and video data IEEE Signal Process. Magn. 17 20-46
  • [2] Setyawan I(2001)Digial watermarking: algorithms and applications IEEE Signal Process. Magn. 18 33-46
  • [3] Lagendijk RL(2014)Data hiding by an improved exploiting modification direction Multimed. Tools Appl. 69 569-584
  • [4] Podilchuk CI(1996)Techniques for data hiding IBM Syst. J. 35 313-336
  • [5] Delp EJ(2014)A novel joint data-hiding and compression scheme based on SMVQ and image inpainting IEEE Trans. Image Process. 23 969-978
  • [6] Kim C(2003)Hide and seek: an introduction to steganography IEEE Secur. Privacy 1 32-44
  • [7] Bender W(2018)On the fault-tolerant performance for a class of robust image steganography Signal Process 146 99-111
  • [8] Gruhl D(2014)Efficient reversible data hiding in encrypted images J. Vis. Commun. Image Rep. 25 322-328
  • [9] Morimoto N(2014)Steganalysis of least significant bit matching using multi-order differences Secur. Commun. Netw. 7 1283-1291
  • [10] Lu A(2016)Steganalysis of LSB matching using differences between nonadjacent pixels Multimed. Tools Appl. 75 1947-1962