Abstract
As the most efficient matrix embedding scheme, syndrome-trellis codes (STCs) has been widely used in the field of data hiding, it is implemented based on syndrome trellis structure of convolutional codes and the Viterbi algorithm. In this paper, a new construction scheme of STCs is proposed based on a family of time-varying periodic convolutional codes, the parity-check matrix is constructed by matrix unwarpping. The proposed scheme can enhance the parameter recognition of STCs efficiently while maintaining similar performance with STCs. Moreover, their construction method is more systematic.
W. Liu—This study was supported by NSF of Jiangsu province (Grant nos. BK20160840, BK20150472), and NSF of China (Grant nos. 61272421, 61472188) and A Project Funded by the Priority Academic Program Development of Jiangsu Higer Education Institutions (PAPD), and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1947–1962 (2016)
Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)
Han, T., Fei, J., Liu, S., Chen, X., Zhu, Y.: High-payload image-hiding scheme based on best-block matching and multi-layered syndrome-trellis codes. In: Benatallah, B., Bestavros, A., Manolopoulos, Y., Vakali, A., Zhang, Y. (eds.) WISE 2014, Part II. LNCS, vol. 8787, pp. 336–350. Springer, Heidelberg (2014)
Xiaoyuan, Y., Duntao, G., Jun, L.: An image steganography based on multi-layered syndrome-trellis codes in DWT domain. In: 2013 32nd Chinese Control Conference (CCC), pp. 3738–3743 (2013)
Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234–239 (2012)
Sedighi, V., Fridrich, J., Cogranne, R.: Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model. In: IS&T/SPIE Electronic Imaging, pp. 94090H–94090H-13 (2015)
Luo, X., Song, X., Li, X., Zhang, W., Lu, J., Yang, C., et al.: Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimedia Tools Appl. 1–27 (2015)
Liu, W., Liu, G., Dai, Y.: On recovery of the stego-key in syndrome-trellis codes. ICIC Express Lett. 8(10), 2901–2906 (2014)
Palazzo Jr., R.: A time-varying convolutional encoder better than the best time-invariant encoder. IEEE Trans. Inf. Theor. 39(3), 1109–1110 (1993)
Lee, P.J.: There are many good periodically time-varying convolutional codes. IEEE Trans. Inf. Theor. 35(2), 460–463 (1989)
Mu, L., Liu, X., Liang, C.: Construction of binary LDPC convolutional codes based on finite fields. IEEE Commun. Lett. 16(6), 897–900 (2012)
Pusane, A.E., Smarandache, R., Vontobel, P.O., Costello, D.J.: Deriving good LDPC convolutional codes from LDPC block codes. IEEE Trans. Inf. Theor. 57(2), 835–857 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Liu, W., Liu, G., Zhai, J., Dai, Y. (2016). A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-48671-0_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48670-3
Online ISBN: 978-3-319-48671-0
eBook Packages: Computer ScienceComputer Science (R0)