Skip to main content

Polar Coding Steganographic Embedding Using Successive Cancellation

  • Conference paper
  • First Online:
Innovation and Interdisciplinary Solutions for Underserved Areas (CNRIA 2017, InterSol 2017)

Abstract

In this paper, we propose a practical adaptive embedding methodology based on Successive Cancellation (SC) polar coding. The new proposed SC-based Polar Coding Steganography (SC-PCS) defines message bits as frozen bits of the SC decoder and computes path metrics according to embedding costs of pixels of the cover image. Simulation results demonstrate that SC-PCS minimizes an arbitrary embedding distortion while embedding covert message.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ker, A.D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J., Pevný, T.: Moving steganography and steganalysis from laboratory to real world. In: Proceedings of the IH&MMSec 2013. ACM, Montpellier, France, June 2013

    Google Scholar 

  2. Holub, V.: Content Adaptive Steganography – Design and Detection. Ph.D. thesis, Binghamton University, May 2014

    Google Scholar 

  3. Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16435-4_13

    Chapter  Google Scholar 

  4. Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 4th IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, December 2012

    Google Scholar 

  5. Holub, V., Fridrich, J., Denemark, T.: Universal distortion design for steganography in an arbitrary domain. EURASIP J. Inf. Secur. Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop, vol. 1, pp. 1–13, January 2014

    Google Scholar 

  6. Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: International Conference on Image Processing (ICIP), Paris, France, pp. 4206–4210, October 2014

    Google Scholar 

  7. Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221–234 (2016)

    Article  Google Scholar 

  8. Crandall, R.: Some notes on steganography. Steganography Mailing List (1998)

    Google Scholar 

  9. Westfeld, A.: F5—A Steganographic Algorithm. In: Moskowitz, Ira S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45496-9_21

    Chapter  Google Scholar 

  10. Schönfeld, D., Winkler, A.: An embedding with syndrome coding based on BCH codes. In: 8th ACM Workshop on Multimedia and Security, pp. 214–223 (2006)

    Google Scholar 

  11. Fontaine, C., Galand, F.: How reed-solomon codes can improve steganographic schemes. EURASIP J. Inf. Secur. 2009, 1–10 (2009)

    Article  Google Scholar 

  12. Diop, I., Farssi, S.M., Chaumont, M., Khouma, O., Diouf, H.B.: Utilisation des codes LDPC en stéganographie. COmpression et REprésentation des Signaux Audiovisuels (CORESA 2012), Lille, France, pp. 98–104, mai 2012

    Google Scholar 

  13. Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)

    Article  Google Scholar 

  14. Arikan, E.: Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Trans. Inf. Theory IT 55(7), 3051–3073 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  15. Tal, I., Vardy, A.: List decoding of polar codes. In: Proceedings of the IEEE International Symposium on Information Theory Proceedings (ISIT), August 2011

    Google Scholar 

  16. Goela, N., Korada, S.B., Gastpar, M.: On LP decoding of polar codes. In: IEEE Transactions Information Theory Workshop (ITW), Dublin (2010)

    Google Scholar 

  17. Taranalli, V., Siegel, P.H.: Adaptive linear programming decoding of polar codes. In: IEEE Symposium on Information Theory (ISIT), pp. 2982–2986, June–July 2014

    Google Scholar 

  18. Diouf, B., Diop, I., Farssi, S.M., Tall, K., Fall, P.A., Diop, A.K., Sylla, K.: Using of polar codes in steganography. In: International Conference on Advances in Computer Science and Engineering (CSE), Atlantis Press, Los Angeles, vol. 42, pp. 262–266, July 2013

    Google Scholar 

  19. Diouf, B., Diop, I., Farssi, S.M., Khouma, O.: Minimizing embedding impact in steganography using polar codes. In: IEEE International Conference on Multimedia Computing and Systems (ICMCS 2014), Marrakesh, Morocco, pp. 105–111, April 2014

    Google Scholar 

  20. Diouf, B., Diop, I., Farssi, S.M., Khouma, O.: Practical polar coding method to minimize the embedding impact in steganography. In: IEEE International Science and Information (SAI) Conference, London, United Kingdom, July 2015

    Google Scholar 

  21. Diouf, B., Diop, I., Farssi, S.M.: Performances of polar codes in steganographic embedding impact minimization. In: ICACT Transactions on Advanced Communications Technology (ICACT-TACT), South Korea, vol. 5(5), pp. 927–935, September 2016

    Google Scholar 

  22. Diouf, B., Diop, I., Wone, K., Farssi, S.M., Khouma, O., Diouf, M., Tall, K.: Adaptive linear programming of polar codes to minimize additive distortion in steganography. In: Proceedings of the IEEE International Science and Information (SAI) Conference, United Kingdom, London, pp. 1086–1092, July 2016

    Google Scholar 

  23. Arikan, E.: Systematic polar coding. IEEE Commun. Lett. 15(8), 860–862 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Birahime Diouf .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Diouf, B. et al. (2018). Polar Coding Steganographic Embedding Using Successive Cancellation. In: M. F. Kebe, C., Gueye, A., Ndiaye, A. (eds) Innovation and Interdisciplinary Solutions for Underserved Areas. CNRIA InterSol 2017 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 204. Springer, Cham. https://doi.org/10.1007/978-3-319-72965-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72965-7_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72964-0

  • Online ISBN: 978-3-319-72965-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics