2006
DOI: 10.1109/tifs.2005.863487
|View full text |Cite
|
Sign up to set email alerts
|

Wet Paper Codes With Improved Embedding Efficiency

Abstract: Abstract-Wet paper codes were previously proposed as a tool for construction of steganographic schemes with arbitrary (non-shared) selection channels. In this paper, we propose a new approach to wet paper codes using random linear codes of small codimension that at the same time improves the embedding efficiency (number of random message bits embedded per embedding change). Practical algorithms are given and their performance is evaluated experimentally and compared to theoretically achievable bounds. An appro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
77
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 121 publications
(77 citation statements)
references
References 13 publications
0
77
0
Order By: Relevance
“…The paper concludes with a February 16, 2007. Revised September 30,2007 DRAFT discussion in Section X.…”
Section: Introductionmentioning
confidence: 92%
“…The paper concludes with a February 16, 2007. Revised September 30,2007 DRAFT discussion in Section X.…”
Section: Introductionmentioning
confidence: 92%
“…For smaller n t , the number of changes is larger. Figure 4 shows the experimental results obtained for n = n t p = 10 6 and n = 4 · 10 6 elements, ρ = 0.1, and ∆ p = 20 lg p for p ≥ 1, along with the WPCs obtained from [6]. WPCs in Figure 4 were obtained from C t = C MAX and C t = C LDGM and can be realized in practice because the overhead of 20 bits (18 bits to communicate the parameters of W l plus two bits overhead) can be realized by WPCs described in Section 4.…”
Section: Practical Wpcs Obtained From Wet Zzwmentioning
confidence: 99%
“…It is also known [6] that the embedding efficiency of any steganographic scheme that embeds m bits using on average R a embedding changes must satisfy e m/R a ≤ α/H −1 (α), where α m/k is the relative message length (w.r.t. dry elements), H −1 (x) is the inverse of the binary entropy function H(x) = −x lg x − (x−1) lg(x−1) on x ∈ [0, 0.5], and lg is logarithm at the base The work on this paper was supported by Air Force Office of Scientific Research under the research grant number FA9550-08-1-0084.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Special codes, called wet paper codes, were proposed for embedding with wet pixels [4,11] (pixels prohibited to be modified for which I i = {x i }). The recently proposed Syndrome-Trellis Codes (STCs) [7,8] unify the approach, achieve near-optimal performance for various distortion costs ̺ i , and perform well even with a large number of wet pixels.…”
Section: Introductionmentioning
confidence: 99%