Improving success probability and embedding efficiency in code based steganography

Morgan Barbier,Carlos Munuera
DOI: https://doi.org/10.48550/arXiv.1302.2048
2013-02-08
Abstract:For stegoschemes arising from error correcting codes, embedding depends on a decoding map for the corresponding code. As decoding maps are usually not complete, embedding can fail. We propose a method to ensure or increase the probability of embedding success for these stegoschemes. This method is based on puncturing codes. We show how the use of punctured codes may also increase the embedding efficiency of the obtained stegoschemes.
Information Theory
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to improve the embedding success rate and efficiency in steganography schemes based on error - correction codes. Specifically, since the decoding mapping is usually incomplete, the embedding process may fail. The author proposes a method through puncturing codes to ensure or increase the embedding success rate of these steganography schemes, and this method can also improve the embedding efficiency. ### Background of the Paper and Problem Description 1. **Basic Concepts of Steganography**: - Steganography is a technique for secretly transmitting information, with the aim of making the existence of communication undetectable by third parties. - In order to reduce the risk of being detected, the changes embedded in the carrier must be as small as possible. Therefore, it is necessary to design efficient steganography systems to embed as much information as possible with the least changes. 2. **Steganography Schemes Based on Error - Correction Codes**: - Crandall first pointed out that error - correction codes can be used to construct steganography schemes with high embedding efficiency. - In steganography schemes based on error - correction codes, the embedding process depends on the decoding mapping of codewords. However, most existing decoding algorithms are unable to decode most error patterns, resulting in frequent failures in the embedding process. 3. **Limitations of Existing Methods**: - Although the complete decoding algorithm can solve this problem, its computational complexity is extremely high. In practical applications, it can only be used for perfect codes or codewords with a short length, and the embedding efficiency of these codewords is low. ### Proposed Method 1. **Concept of Puncturing Codes**: - Puncturing codes refer to generating new codewords by deleting certain positions in the codewords. - The author proposes to puncture the original codeword multiple times until the covering radius of the new codeword is equal to the error - correction ability of the original codeword, thereby ensuring successful embedding. 2. **Specific Implementation**: - By selecting appropriate puncturing positions, a new codeword can be generated, whose covering radius is equal to the error - correction ability. - This method not only improves the embedding success rate but may also improve the embedding efficiency. ### Experimental Results 1. **Numerical Experiments**: - The author conducted experiments on binary BCH codes to verify the effectiveness of the proposed method. - The experimental results show that the steganography scheme using puncturing codes may be superior to the original BCH code steganography scheme in terms of embedding efficiency. 2. **Performance Comparison**: - Through graphical representation, it can be seen that the puncturing code steganography scheme performs better in terms of embedding efficiency. - Although there is no significant improvement in the average embedding efficiency, the puncturing code steganography scheme performs better in the worst - case scenario. ### Conclusion The author proposes a method to ensure or increase the embedding success rate of steganography schemes based on error - correction codes through puncturing codes. The experimental results show that this method not only improves the embedding success rate but may also improve the embedding efficiency. This provides new ideas and methods for the development of steganography technology.