2009 First IEEE International Workshop on Information Forensics and Security (WIFS) 2009
DOI: 10.1109/wifs.2009.5386467
|View full text |Cite
|
Sign up to set email alerts
|

Wet ZZW construction for steganography

Abstract: Wet paper codes are an essential tool for communication with non-shared selection channels. Inspired by the recent ZZW construction for matrix embedding [11], we propose a novel wet paper coding scheme with high embedding efficiency. The performance is analyzed under the assumption that wet cover elements form an i.i.d. Bernoulli sequence. Attention is paid to implementation details to minimize capacity loss in practice.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
8
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 9 publications
(18 reference statements)
0
8
0
Order By: Relevance
“…Wet paper codes minimizing the number of changed dry pixels were described in [34], [31], [14], [13].…”
Section: A Prior Artmentioning
confidence: 99%
See 1 more Smart Citation
“…Wet paper codes minimizing the number of changed dry pixels were described in [34], [31], [14], [13].…”
Section: A Prior Artmentioning
confidence: 99%
“…A well-known example is matrix embedding where the sender minimizes the total number of embedding changes. Near-optimal coding schemes for this problem appeared in [8], [9], together with other clever constructions and extensions [10], [11], [12], [13], [14], [15]. When the singleletter distortions vary across the cover elements, reflecting thus different costs of individual embedding changes, current coding methods are highly suboptimal [2], [4].…”
mentioning
confidence: 99%
“…An established way of evaluating practical coding algorithms in steganography is to compare the embedding efficiency e(α) = αn/E π [D] for a fixed expected relative payload α = m/n with the upper bound derived from (4). When the number of changes is minimized, e is the average number of bits hidden per one change.…”
Section: Performance Bounds and Comparison Metricsmentioning
confidence: 99%
“…Special codes, called wet paper codes, were proposed for embedding with wet pixels [4,11] (pixels prohibited to be modified for which I i = {x i }). The recently proposed Syndrome-Trellis Codes (STCs) [7,8] unify the approach, achieve near-optimal performance for various distortion costs ̺ i , and perform well even with a large number of wet pixels.…”
Section: Introductionmentioning
confidence: 99%
“…15,[20][21][22]. Even though other distortion profiles, such as the linear profile, are of great interest to steganography, no general solution with performance close to the bound is currently known.…”
mentioning
confidence: 99%