메뉴 건너뛰기




Volumn 6, Issue 3 PART 2, 2011, Pages 920-935

Minimizing additive distortion in steganography using syndrome-trellis codes

Author keywords

Coding loss; convolutional codes; embedding impact; matrix embedding; steganography; trellis coded quantization; wet paper codes

Indexed keywords

CODING LOSS; EMBEDDING IMPACT; MATRIX; TRELLIS-CODED QUANTIZATION; WET PAPER CODES;

EID: 80051709471     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2134094     Document Type: Article
Times cited : (862)

References (48)
  • 2
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science
    • Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography", in Proc. 8th Int. Workshop Inf. Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 314-327.
    • (2006) Proc. 8th Int. Workshop Inf. Hiding , vol.4437 , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 3
    • 70449664021 scopus 로고    scopus 로고
    • Fast BCH syndrome coding for steganography
    • S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, Jun. 7-10, Lecture Notes in Computer Science
    • R. Zhang, V. Sachnev, and H. J. Kim, "Fast BCH syndrome coding for steganography", in Proc. 11th Int. Workshop Inf. Hiding, S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, Jun. 7-10, 2009, vol. 5806, Lecture Notes in Computer Science, pp. 31-47.
    • (2009) Proc. 11th Int. Workshop Inf. Hiding , vol.5806 , pp. 31-47
    • Zhang, R.1    Sachnev, V.2    Kim, H.J.3
  • 4
    • 70449657749 scopus 로고    scopus 로고
    • Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
    • J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8
    • V. Sachnev, H. J. Kim, and R. Zhang, "Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding", in Proc. 11th ACM Multimedia Security Workshop, J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8, 2009, pp. 131-140.
    • (2009) Proc. 11th ACM Multimedia Security Workshop , pp. 131-140
    • Sachnev, V.1    Kim, H.J.2    Zhang, R.3
  • 5
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • P. W. L. Fong, R. Böhme, and R. Safavi-Naini, Eds., Calgary, Canada, Jun. 28-30, Lecture Notes in Computer Science
    • T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography", in Proc. 12th Int. Workshop Inf. Hiding, P. W. L. Fong, R. Böhme, and R. Safavi-Naini, Eds., Calgary, Canada, Jun. 28-30, 2010, vol. 6387, Lecture Notes in Computer Science, pp. 161-177.
    • (2010) Proc. 12th Int. Workshop Inf. Hiding , vol.6387 , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 6
    • 56749154804 scopus 로고    scopus 로고
    • On completeness of feature spaces in blind steganalysis
    • A. D. Ker, J. Dittmann, and J. Fridrich, Eds., Oxford, U. K., Sep. 22-23
    • J. Kodovský and J. Fridrich, "On completeness of feature spaces in blind steganalysis", in Proc. 10th ACM Multimedia Security Workshop, A. D. Ker, J. Dittmann, and J. Fridrich, Eds., Oxford, U. K., Sep. 22-23, 2008, pp. 123-132.
    • (2008) Proc. 10th ACM Multimedia Security Workshop , pp. 123-132
    • Kodovský, J.1    Fridrich, J.2
  • 8
    • 34548216307 scopus 로고    scopus 로고
    • Practical methods for minimizing embedding impact in steganography
    • E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1
    • J. Fridrich and T. Filler, "Practical methods for minimizing embedding impact in steganography", in Proc. SPIE, Electron. Imag., Security, Steganography, Watermark. Multimedia Contents IX, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1, 2007, vol. 6505, pp. 02-03.
    • (2007) Proc. SPIE, Electron. Imag., Security, Steganography, Watermark. Multimedia Contents IX , vol.6505 , pp. 02-03
    • Fridrich, J.1    Filler, T.2
  • 9
    • 84940671644 scopus 로고    scopus 로고
    • Binary quantization using belief propagation over factor graphs of LDGM codes
    • Control, Comput., Allerton, IL, Sep. 26-28
    • T. Filler and J. Fridrich, "Binary quantization using belief propagation over factor graphs of LDGM codes", presented at the 45th Annu. Allerton Conf. Commun., Control, Comput., Allerton, IL, Sep. 26-28, 2007.
    • (2007) The 45th Annu. Allerton Conf. Commun.
    • Filler, T.1    Fridrich, J.2
  • 10
    • 34247247816 scopus 로고    scopus 로고
    • Efficient double-layered steganographic embedding
    • DOI 10.1049/el:20070248
    • X. Zhang, W. Zhang, and S. Wang, "Efficient double-layered steganographic embedding", Electron. Lett., vol. 43, pp. 482-483, Apr. 2007. (Pubitemid 46609952)
    • (2007) Electronics Letters , vol.43 , Issue.8 , pp. 482-483
    • Zhang, X.1    Zhang, W.2    Wang, S.3
  • 11
    • 34548335302 scopus 로고    scopus 로고
    • Improving embedding efficiency of covering codes for applications in steganography
    • DOI 10.1109/LCOMM.2007.070438
    • W. Zhang, S. Wang, and X. Zhang, "Improving embedding efficiency of covering codes for applications in steganography", IEEE Commun. Lett., vol. 11, pp. 680-682, Aug. 2007. (Pubitemid 47342268)
    • (2007) IEEE Communications Letters , vol.11 , Issue.8 , pp. 680-682
    • Zhang, W.1    Wang, S.2    Zhang, X.3
  • 12
    • 56749177023 scopus 로고    scopus 로고
    • Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes
    • K. Solanki, K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun. 19-21, Lecture Notes in Computer Science
    • W. Zhang, X. Zhang, and S. Wang, "Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes", in Proc. 10th Int. Workshop Inf. Hiding, K. Solanki, K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun. 19-21, 2008, vol. 5284, Lecture Notes in Computer Science, pp. 60-71.
    • (2008) Proc. 10th Int. Workshop Inf. Hiding , vol.5284 , pp. 60-71
    • Zhang, W.1    Zhang, X.2    Wang, S.3
  • 14
    • 77951866880 scopus 로고    scopus 로고
    • Improving the embedding efficiency of wet paper codes by paper folding
    • Sep.
    • W. Zhang and X. Zhu, "Improving the embedding efficiency of wet paper codes by paper folding", IEEE Signal Process. Lett., vol. 16, pp. 794-797, Sep. 2009.
    • (2009) IEEE Signal Process. Lett. , vol.16 , pp. 794-797
    • Zhang, W.1    Zhu, X.2
  • 15
    • 69749111992 scopus 로고    scopus 로고
    • Generalization of the ZZW embedding construction for steganography
    • Sep.
    • W. Zhang and X. Wang, "Generalization of the ZZW embedding construction for steganography", IEEE Trans. Inf. Forensics Security, vol. 4, pp. 564-569, Sep. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , pp. 564-569
    • Zhang, W.1    Wang, X.2
  • 16
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
    • DOI 10.1145/1288869.1288872, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
    • J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities", in Proc. 9th ACM Multimedia Security Workshop, J. Dittmann and J. Fridrich, Eds., Dallas, TX, Sep. 20-21, 2007, pp. 3-14. (Pubitemid 351203799)
    • (2007) MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007 , pp. 3-14
    • Fridrich, J.1    Pevny, T.2    Kodovsky, J.3
  • 17
    • 77951871502 scopus 로고    scopus 로고
    • Minimizing embedding impact in steganography using trellis-coded quantization
    • N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21
    • T. Filler, J. Judas, and J. Fridrich, "Minimizing embedding impact in steganography using trellis-coded quantization", in Proc. SPIE, Electron. Imag., Security, Forensics Multimedia XII, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21, 2010, vol. 7541, pp. 05-01-05-14.
    • (2010) Proc. SPIE, Electron. Imag., Security, Forensics Multimedia XII , vol.7541 , pp. 0501-0514
    • Filler, T.1    Judas, J.2    Fridrich, J.3
  • 18
    • 80051722687 scopus 로고    scopus 로고
    • Using non-binary embedding operation to minimize additive distortion functions in steganography
    • Seattle, WA, Dec. 12-15
    • T. Filler and J. Fridrich, "Using non-binary embedding operation to minimize additive distortion functions in steganography", presented at the 2nd IEEE Int. Workshop Inf. Forensics Security, Seattle, WA, Dec. 12-15, 2010.
    • (2010) The 2nd IEEE Int. Workshop Inf. Forensics Security
    • Filler, T.1    Fridrich, J.2
  • 19
    • 0019148101 scopus 로고
    • Coding for channel with random parameters
    • S. I. Gel'fand and M. S. Pinsker, "Coding for channel with random parameters", Problems Control Inf. Theory, vol. 9, no. 1, pp. 19-31, 1980.
    • (1980) Problems Control Inf. Theory , vol.9 , Issue.1 , pp. 19-31
    • Gel'fand, S.I.1    Pinsker, M.S.2
  • 20
    • 38049111044 scopus 로고    scopus 로고
    • Batch steganography and pooled steganalysis
    • J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science
    • A. D. Ker, "Batch steganography and pooled steganalysis", in Proc. 8th Int. Workshop Inf. Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 265-281.
    • (2006) Proc. 8th Int. Workshop Inf. Hiding , vol.4437 , pp. 265-281
    • Ker, A.D.1
  • 21
    • 0003214704 scopus 로고
    • Coding theorems for a discrete source with a fidelity criterion
    • C. E. Shannon, "Coding theorems for a discrete source with a fidelity criterion", IRE Nat. Conv. Rec., vol. 4, pp. 142-163, 1959.
    • (1959) IRE Nat. Conv. Rec. , vol.4 , pp. 142-163
    • Shannon, C.E.1
  • 23
    • 84937814312 scopus 로고    scopus 로고
    • F5-A steganographic algorithm: High capacity despite better steganalysis
    • Information Hiding
    • A. Westfeld, "High capacity despite better steganalysis (F5-A steganographic algorithm)", in Proc. 4th Int. Workshop Inf. Hiding, I. S. Moskowitz, Ed., Pittsburgh, PA, Apr. 25-27, 2001, vol. 2137, Lecture Notes in Computer Science, pp. 289-302. (Pubitemid 33367674)
    • (2001) Lecture Notes in Computer Science , Issue.2137 , pp. 289-302
    • Westfeld, A.1
  • 24
    • 30744445178 scopus 로고    scopus 로고
    • Perturbed quantization steganography
    • DOI 10.1007/s00530-005-0194-3
    • J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography", ACM Multimedia Syst. J., vol. 11, no. 2, pp. 98-107, 2005. (Pubitemid 43099511)
    • (2005) Multimedia Systems , vol.11 , Issue.2 , pp. 98-107
    • Fridrich, J.1    Goljan, M.2    Soukal, D.3
  • 26
    • 28944435491 scopus 로고    scopus 로고
    • Data-hiding codes
    • P. Moulin and R. Koetter, "Data-hiding codes", Proc. IEEE, vol. 93, no. 12, pp. 2083-2126, 2005.
    • (2005) Proc. IEEE , vol.93 , Issue.12 , pp. 2083-2126
    • Moulin, P.1    Koetter, R.2
  • 27
    • 14844285173 scopus 로고    scopus 로고
    • Some notes on steganography
    • Online. Available
    • R. Crandall, "Some notes on steganography", in Steganography Mailing List [Online]. Available: http://os.inf.tu-dresden. de/westfeld/ crandall.pdf 1998
    • (1998) Steganography Mailing List
    • Crandall, R.1
  • 28
    • 33645661269 scopus 로고    scopus 로고
    • Online. Available
    • J. Bierbrauer, On Crandall's Problem [Online]. Available: http://www.ws.binghamton. edu/fridrich/covcodes.pdf 1998
    • (1998) On Crandall's Problem
    • Bierbrauer, J.1
  • 29
    • 45449087266 scopus 로고    scopus 로고
    • Constructing good covering codes for applications in steganography
    • J. Bierbrauer and J. Fridrich, "Constructing good covering codes for applications in steganography", LNCS Trans. Data Hiding Multimedia Security, vol. 4920, pp. 1-22, 2008.
    • (2008) LNCS Trans. Data Hiding Multimedia Security , vol.4920 , pp. 1-22
    • Bierbrauer, J.1    Fridrich, J.2
  • 30
    • 0242640249 scopus 로고    scopus 로고
    • Embedding information in grayscale images
    • Enschede, The Netherlands, May 15-16
    • M. van Dijk and F. Willems, "Embedding information in grayscale images", in Proc. 22nd Symp. Inf. Commun. Theory, Enschede, The Netherlands, May 15-16, 2001, pp. 147-154.
    • (2001) Proc. 22nd Symp. Inf. Commun. Theory , pp. 147-154
    • Van Dijk, M.1    Willems, F.2
  • 31
    • 33750922236 scopus 로고    scopus 로고
    • Embedding with syndrome coding based on BCH codes
    • Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
    • D. Schönfeld and A. Winkler, "Embedding with syndrome coding based on BCH codes", in Proc. 8th ACM Multimedia Security Workshop, S. Voloshynovskiy, J. Dittmann, and J. Fridrich, Eds., Geneva, Switzerland, Sep. 26-27, 2006, pp. 214-223. (Pubitemid 44729598)
    • (2006) Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06 , vol.2006 , pp. 214-223
    • Schonfeld, D.1    Winkler, A.2
  • 33
    • 60449112398 scopus 로고    scopus 로고
    • Asymptotic behavior of the ZZW embedding construction
    • Mar.
    • J. Fridrich, "Asymptotic behavior of the ZZW embedding construction", IEEE Trans. Inf. Forensics Security, vol. 4, pp. 151-153, Mar. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , pp. 151-153
    • Fridrich, J.1
  • 34
  • 35
    • 67650099990 scopus 로고    scopus 로고
    • Channel polarization: A method for constructing capacityachieving codes for symmetric binary-input memoryless channels
    • Jul.
    • E. Arikan, "Channel polarization: A method for constructing capacityachieving codes for symmetric binary-input memoryless channels", IEEE Trans. Inf. Theory, vol. 55, pp. 3051-3073, Jul. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , pp. 3051-3073
    • Arikan, E.1
  • 36
    • 77950200691 scopus 로고    scopus 로고
    • Polar codes are optimal for lossy source coding
    • Apr.
    • S. B. Korada and R. L. Urbanke, "Polar codes are optimal for lossy source coding", IEEE Trans. Inf. Theory, vol. 56, pp. 1751-1768, Apr. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , pp. 1751-1768
    • Korada, S.B.1    Urbanke, R.L.2
  • 37
  • 38
    • 70350562893 scopus 로고    scopus 로고
    • The square root law of steganographic capacity for markov covers
    • N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 18-21
    • T. Filler, A. D. Ker, and J. Fridrich, "The Square Root Law of steganographic capacity for Markov covers", in Proc. SPIE, Electron. Imag., Security, Forensics Multimedia XI, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 18-21, 2009, vol. 7254, pp. 081-0811.
    • (2009) Proc. SPIE, Electron. Imag., Security, Forensics Multimedia XI , vol.7254 , pp. 081-0811
    • Filler, T.1    Ker, A.D.2    Fridrich, J.3
  • 39
    • 70449644855 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8
    • T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix", in Proc. 11th ACM Multimedia Security Workshop, J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8, 2009, pp. 75-84.
    • (2009) Proc. 11th ACM Multimedia Security Workshop , pp. 75-84
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 40
    • 70449646940 scopus 로고    scopus 로고
    • Calibration revisited
    • J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8
    • J. Kodovský and J. Fridrich, "Calibration revisited", in Proc. 11th ACM Multimedia Security Workshop, J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8, 2009, pp. 63-74.
    • (2009) Proc. 11th ACM Multimedia Security Workshop , pp. 63-74
    • Kodovský, J.1    Fridrich, J.2
  • 41
    • 0016058778 scopus 로고
    • Trellis encoding of memoryless discrete-time sources with a fidelity criterion
    • May
    • A. Viterbi and J. Omura, "Trellis encoding of memoryless discrete-time sources with a fidelity criterion", IEEE Trans. Inf. Theory, vol. 20, pp. 325-332, May 1974.
    • (1974) IEEE Trans. Inf. Theory , vol.20 , pp. 325-332
    • Viterbi, A.1    Omura, J.2
  • 42
    • 27744488578 scopus 로고    scopus 로고
    • On the error exponent of trellis source coding
    • DOI 10.1109/TIT.2005.856953
    • I. Hen and N. Merhav, "On the error exponent of trellis source coding", IEEE Trans. Inf. Theory, vol. 51, no. 11, pp. 3734-3741, 2005. (Pubitemid 41622576)
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.11 , pp. 3734-3741
    • Hen, I.1    Merhav, N.2
  • 43
    • 0037356065 scopus 로고    scopus 로고
    • Distributed source coding using syndromes (DISCUS): Design and construction
    • S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction", IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 626-643, 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.3 , pp. 626-643
    • Pradhan, S.1    Ramchandran, K.2
  • 44
    • 0028514190 scopus 로고
    • Decoding of convolutional codes using a syndrome trellis
    • V. Sidorenko and V. Zyablov, "Decoding of convolutional codes using a syndrome trellis", IEEE Trans. Inf. Theory, vol. 40, no. 5, pp. 1663-1666, 1994.
    • (1994) IEEE Trans. Inf. Theory , vol.40 , Issue.5 , pp. 1663-1666
    • Sidorenko, V.1    Zyablov, V.2
  • 45
    • 0029304929 scopus 로고
    • Covering properties of convolutional codes and associated lattices
    • A. Calderbank, P. Fishburn, and A. Rabinovich, "Covering properties of convolutional codes and associated lattices", IEEE Trans. Inf. Theory, vol. 41, no. 3, pp. 732-746, 1995.
    • (1995) IEEE Trans. Inf. Theory , vol.41 , Issue.3 , pp. 732-746
    • Calderbank, A.1    Fishburn, P.2    Rabinovich, A.3
  • 46
    • 34548220950 scopus 로고    scopus 로고
    • Trellis coded modulation to improve dirty paper trellis watermarking
    • E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1
    • C. K. Wang, G. Doërr, and I. Cox, "Trellis coded modulation to improve dirty paper trellis watermarking", in Proc. SPIE, EI, Security, Steganography, Watermarking Multimedia Contents IX, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1, 2007, p. 65050G.
    • (2007) Proc. SPIE, EI, Security, Steganography, Watermarking Multimedia Contents IX
    • Wang, C.K.1    Doërr, G.2    Cox, I.3
  • 47
    • 77951862698 scopus 로고    scopus 로고
    • Modern steganalysis can detect YASS
    • N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21
    • J. Kodovský, T. Pevný, and J. Fridrich, "Modern steganalysis can detect YASS", in Proc. SPIE, Electron. Imag., Security, Forensics Multimedia XII, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21, 2010, vol. 7541, pp. 02-01-02-11.
    • (2010) Proc. SPIE, Electron. Imag., Security, Forensics Multimedia XII , vol.7541 , pp. 0201-0211
    • Kodovský, J.1    Pevný, T.2    Fridrich, J.3
  • 48
    • 78649422691 scopus 로고    scopus 로고
    • Online. Available
    • P. Bas and T. Furon, BOWS-2 [Online]. Available: http://bows2.gipsalab. inpg.fr Jul. 2007
    • (2007) BOWS-2
    • Bas, P.1    Furon, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.