|Table of Contents|

Methods for Embedding Data in Gray-scale Signals


Research Field:
Publishing date:


Methods for Embedding Data in Gray-scale Signals
ZHANG Wei-ming12ZHANG Xin-peng1WANG Shuo-zhong1
1.School of Communication and Information Engineering,Shanghai University,Shanghai 200072,China;2.Institute of Information Engineering,Information Engineering University,Zhengzhou 450002,China
steganographic codes matrix coding wet paper codes embedding rate maximum average distortion
Efficient methods for embedding data in gray-scale signals are presented.By using binary steganographic codes and wet paper codes,a "double-layered" embedding scheme for ±1 steganography is proposed.It is proved out that the corresponding "double-layered" embedding can achieve the upper bound of ±1 steganography if the bianry stego-code reaches the upper bound on embedding rate of binary steganography.A "triple-layered" embedding scheme for ±2 steganography is presented.The distance between the "triple-layered" embedding and the upper bound is analysed.The results show that the near optimal embedding schemes for ±2 steganography can be obtained by combining "double-layered" and "triple-layered" embedding methods.


[1] Cranda llR. Some no tes on steganography [ EB /OL]. http: / / os. in.f tu??dresden. de /~ westfeld/ cranda l.l pd,f 2007- 01- 15.
[2] W estfeld A. F5??A steganog raph ic a lgor ithm: h igh ca?? pac ity despite better stegana ly sis [ A ]. Proc o f In fo r?? m ation H id ing, the 4th Internationa lW orkshop [ C ]. Ber lin: Springer??Verlag, 2001. 289- 302.
[3] Ga land F, Kaba tiansky G. Inform ation h id ing by cov?? e rings [ A ]. Proc o f the IEEE Inform a tion Theory W orkshop [ C] . Ame rica: IEEE, 2004. 151- 154.
[4] B ierbrauer J, Fr idrich J. Constructing good cover ing codes for app lications in steganog raphy [ EB /OL]. ht?? tp: / /www. w s. b ingham ton. edu / fr idr ich/Research / stegocovsurveyOct07. pd,f 2007- 04- 03.
[5] Sch??fe ld D, W inkler A. Embedd ing w ith syndrom e coding based on BCH codes [ A ]. Proc o f ACM the 8thW o rkshop onM ultim edia and Secur ity [ C]. New York: A ssoc iation fo r Computing M ach inery, 2006. 214- 223.
[6] Fridr ich J, Souka lD. M atr ix em bedding fo r large pay?? loads [ J] . IEEE Transactions on In fo rm ation Secur ity and Forens ics, 2006, 1 ( 3): 390- 394.
[7] Fridr ich J, Filler T. Practica l me thods for m in im izing embedd ing im pact in steganog raphy [ EB /OL] . ht?? tp: / /www. w s. bingham ton. edu / fr idr ich/Research / m a in03. pd,f 2007- 04- 03.
[8] W illems F, D ijkM. Capac ity and codes for embedd ing info rma tion in gray??scale signals [ J]. IEEE T ransac?? tions on Inform ation Theory, 2005, 51 ( 3): 1 209 - 1 214.
[9] Zhang X, W ang S. E ffic ient steganographic embedd ing by exp lo iting m odifica tion d irection [ J] . IEEE Com?? m un ications Lette rs, 2006, 10 ( 11): 781- 783.
[10] Fridr ich J, Lison??k P. Gr id co lor ing in steganography [ J]. IEEE Transactions on Inform ation Theory, 2007, 53 ( 4): 1 547- 1 549.
[11] Fr idrich J, Go ljan M, Lisonek P, e t a.l W riting on we t pape r [ J]. IEEE Transac tions on Signa l Process?? ing, 2005, 53 ( 10): 3 923- 3 935.


Last Update: 2008-04-30