DOI: 10.1007/978-3-540-74124-4_19
|View full text |Cite
|
Sign up to set email alerts
|

On Steganographic Embedding Efficiency

Abstract: In this paper, we study embedding efficiency, which is an important attribute of steganographic schemes directly influencing their security. It is defined as the expected number of embedded random message bits per one embedding change. Constraining ourselves to embedding realized using linear covering codes (so called matrix embedding), we show that the quantity that determines embedding efficiency is not the covering radius but the average distance to code. We demonstrate that for linear codes of fixed block … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 63 publications
(37 citation statements)
references
References 19 publications
0
37
0
Order By: Relevance
“…Given a code of length n, dimension k = n − t and covering radius ρ we can always compose the conventional steganographic protocol by using the coset algorithm (Algorithm 1) with an embedding rate k/n and average distortion bounded by ρ/n. However, as it is pointed out in [4], for the same embedding rate, the smallest average distortion is not always obtained with the code of smallest covering radius. The average distortion is determined by the encoding algorithm.…”
Section: Introduction and Preliminary Resultsmentioning
confidence: 79%
“…Given a code of length n, dimension k = n − t and covering radius ρ we can always compose the conventional steganographic protocol by using the coset algorithm (Algorithm 1) with an embedding rate k/n and average distortion bounded by ρ/n. However, as it is pointed out in [4], for the same embedding rate, the smallest average distortion is not always obtained with the code of smallest covering radius. The average distortion is determined by the encoding algorithm.…”
Section: Introduction and Preliminary Resultsmentioning
confidence: 79%
“…matrix embedding [16]. Effectively, the location of the changes, as well as their content, conveys information to the recipient, allowing the payload transmitted to be (slightly) superlinear in γ.…”
Section: Discussionmentioning
confidence: 99%
“…Even though universal kernels guarantee that MMD[F, p, q] = 0 if and only if p = q, the choice of the kernel parameter γ has obviously a major influence on the finite sample estimate of MMD (14). If γ is large, the kernel is very narrow and thus k(x i , x j ) ≈ 0 (the discrete approximation to the RKHS "overfits" the data).…”
Section: Methodsmentioning
confidence: 99%
“…For example, methods that use matrix embedding [14] exhibit sharp non-linear decrease in detectability with decreasing payload due to significantly lower number of embedding changes, while other methods do not allow matrix embedding (e.g., adaptive schemes). Moreover, some steganographic algorithms are inherently limited to binary codes, such as methods based on perturbed quantization [25,15], while methods that use ±1 type of embedding can utilize more powerful ternary codes [14]. Thus, one steganographic method can be embedding significantly higher payload than some other method for the same distortion budget.…”
Section: Stego Imagesmentioning
confidence: 99%