2009
DOI: 10.1109/tifs.2008.2011082
|View full text |Cite
|
Sign up to set email alerts
|

Asymptotic Behavior of the ZZW Embedding Construction

Abstract: Abstract-We analyze asymptotic behavior of the embedding construction for steganography proposed by Zhang, Zhang, and Wang (ZZW) at 10th Information Hiding by deriving a closedform expression for the limit between embedding efficiency of the ZZW construction and the theoretical upper bound as a function of relative payload. This result confirms the experimental observation made in the original publication. I. MOTIVATION AND BACKGROUNDSteganography deals with secret communication by hiding messages in innocuous… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…One of the leading source coding schemes is given by the construction in [18], dubbed ZZW after its authors, which converts one matrix embedding scheme into another. The construction is (in a sense described in [6]) optimal when it is applied to the trivial embedding of one bit per location. It involves, like Algorithm 2, breaking the cover image into groups and using a Hamming code within each group; it also involves a wet paper code so that the changes in each block can signal further information (see [18] for the details).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the leading source coding schemes is given by the construction in [18], dubbed ZZW after its authors, which converts one matrix embedding scheme into another. The construction is (in a sense described in [6]) optimal when it is applied to the trivial embedding of one bit per location. It involves, like Algorithm 2, breaking the cover image into groups and using a Hamming code within each group; it also involves a wet paper code so that the changes in each block can signal further information (see [18] for the details).…”
Section: Discussionmentioning
confidence: 99%
“…This would be a curious result, because the ZZW construction is more efficient in terms of bits conveyed per change. Perhaps this can be reconciled by the comment in [6], where it is noted that both Hamming and ZZW families "parallel" the rate distortion bound, when embedding efficiency against embedding rate is charted in a particular way. We might conjecture that all schemes which have the same property are equally secure as regards their asymptotic KL divergence ESFI.…”
Section: Source Codingmentioning
confidence: 99%
“…Current state-of-the-art methods use codes based on Low Density Generator Matrices (LDGMs) [8] in combination with the ZZW construction [15]. The embedding efficiency of these codes stays rather close to the bound for arbitrarily small relative payloads [33].…”
Section: A Prior Artmentioning
confidence: 99%
“…J. Fridrich noted that the embedding construction for ±1embedding also proposed in [5] approaches the bound on embedding efficiency of ternary codes with the same limit, because the ternary bound increases by 1 compared to the binary bound. The embedding effectiveness of ±1ZZW code families is also larger by 1 [6].…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 98%