IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Eliminating Steganography in Internet Traffic with Active Wardens
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
Minimizing the embedding impact in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Proceedings of the 10th ACM workshop on Multimedia and security
Turbo-like Codes: Design for High Speed Decoding
Turbo-like Codes: Design for High Speed Decoding
Proceedings of the 11th ACM workshop on Multimedia and security
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
Public-key steganography with active attacks
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Wet paper codes with improved embedding efficiency
IEEE Transactions on Information Forensics and Security
Matrix embedding for large payloads
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Theory
Robust image-adaptive data hiding using erasure and error correction
IEEE Transactions on Image Processing
A hybrid embedded steganography technique: optimum pixel method and matrix embedding
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Information theory applications in error bit rate analysis of digital image watermarking
Computers and Electrical Engineering
Information Sciences: an International Journal
Hi-index | 0.00 |
In matrix embedding (ME)-based steganography, the host coefficients are minimally perturbed such that the transmitted bits fall in a coset of a linear code, with the syndrome conveying the hidden bits. The corresponding embedding distortion and vulnerability to steganalysis are significantly less than that of conventional quantization index modulation (QIM)-based hiding. However, ME is less robust to attacks, with a single host bit error leading to multiple decoding errors for the hidden bits. In this paper, we employ the ME-RA scheme, a combination of ME-based hiding with powerful repeat accumulate (RA) codes for error correction, to address this problem. A key contribution of this paper is to compute log likelihood ratios for RA decoding, taking into account the many-to-one mapping between the host coefficients and an encoded bit, for ME. To reduce detectability, we hide in randomized blocks, as in the recently proposed Yet Another Steganographic Scheme (YASS), replacing the QIM-based embedding in YASS by the proposed ME-RA scheme. We also show that the embedding performance can be improved by employing punctured RA codes. Through experiments based on a couple of thousand images, we show that for the same embedded data rate and a moderate attack level, the proposed ME-based method results in a lower detection rate than that obtained for QIM-based YASS.