Skip to main content

Efficient Wet Paper Codes

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3727))

Abstract

Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipient. In this paper, we describe new approaches to wet paper codes that enjoy low computational complexity and improved embedding efficiency (number of message bits per embedding change). Some applications of wet paper codes to steganography and data embedding in binary images are discussed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J., Petitcolas, F.A.P.: On the Limits of Steganography. IEEE Journal of Selected Areas in Communications. Special Issue on Copyright and Privacy Protection 16(4), 474–481 (1998)

    Google Scholar 

  2. Westfeld, A.: High Capacity Despite Better Steganalysis (F5–A Steganographic Algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Karahan, M., Topkara, U., Atallah, M., Taskiran, C., Lin, E., Delp, E.: A Hierarchical Protocol for Increasing the Stealthiness of Steganographic Methods. In: Proc. ACM Multimedia and Security Workshop, Magdeburg, Germany, pp. 16–24 (2004)

    Google Scholar 

  4. Westfeld, A., Böhme, R.: Exploiting Preserved Statistics for Steganalysis. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67–81. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Fridrich, J., Goljan, M., Soukal, D.: Perturbed Quantization Steganography with Wet Paper Codes. In: Proc. ACM Multimedia and Security Workshop. Magdeburg Germany, pp. 4–15 (2004)

    Google Scholar 

  6. Fridrich, J., Goljan, M., Lisoněk, P., Soukal, D.: Writing on Wet Paper. (Journal version) To appear in IEEE Trans. on Sig. Proc. Special Issue on Media Security (2005)

    Google Scholar 

  7. Fridrich, J., Goljan, M., Lisoněk, P., Soukal, D.: Writing on Wet Paper. In: Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, pp. 328–340 (2005)

    Google Scholar 

  8. Kuznetsov, A.V., Tsybakov, B.S.: Coding in a Memory with Defective Cells. Probl. Inform. Transmission 10, 132–138 (1974)

    Google Scholar 

  9. Gelfand, S.I., Pinsker, M.S.: Coding for Channel with Random Parameters. Probl. Pered. Inform. (Probl. Inform. Transm.) 9(1), 19–31 (1980)

    MathSciNet  Google Scholar 

  10. Zamir, R., Shamai, S., Erez, U.: Nested Linear/Lattice Codes for Structured Multiterminal Binning. IEEE Trans. Inf. Th. 48(6), 1250–1276 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  11. Heegard, C.: Partitioned Linear Block Codes for Computer Memory with ‘Stuck-at’ Defects. IEEE Trans. Inf. Th. 29, 831–842 (1983)

    Article  MATH  MathSciNet  Google Scholar 

  12. Heegard, C., El-Gamal, A.: On the Capacity of Computer Memory with Defects. IEEE Trans. Inf. Th. 29, 731–739 (1983)

    Article  MATH  Google Scholar 

  13. Luby, M.: LT Codes. In: Proc. The 43rd Annual IEEE Symposium on Foundations of Computer Science, pp. 271–282 (2002)

    Google Scholar 

  14. Brent, R.P., Gao, S., Lauder, A.G.B.: Random Krylov Spaces Over Finite Fields. SIAM J. Discrete Math. 16(2), 276–287 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  15. Crandall, R.: Some Notes on Steganography. In: Posted on Steganography Mailing List (1998), http://os.inf.tu-dresden.de/~westfeld/crandall.pdf

  16. Galand, F., Kabatiansky, G.: Information Hiding by Coverings. In: Proc. ITW 2003, Paris France, pp. 151–154 (2003)

    Google Scholar 

  17. Fridrich, J., Goljan, M., Soukal, D., Holotyak, T.: Forensic Steganalysis: Determining the Stego Key in Spatial Domain Steganography. In: Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, pp. 631–642 (2005)

    Google Scholar 

  18. Wu, M., Tang, E., Liu, B.: Data Hiding in Digital Binary Image. In: Proc. Conf. on Multimedia & Expo., New York (2000) (CD version)

    Google Scholar 

  19. Wu, M., Fridrich, J., Goljan, M., Gou, H.: Data Hiding in Digital Binary Images: A Revisit. In: Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII. San Jose, pp. 194–205 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fridrich, J., Goljan, M., Soukal, D. (2005). Efficient Wet Paper Codes. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_16

Download citation

  • DOI: https://doi.org/10.1007/11558859_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29039-1

  • Online ISBN: 978-3-540-31481-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics