Skip to main navigation Skip to search Skip to main content

Matrix embedding for large payloads

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

40 Scopus citations

Abstract

Matrix embedding is a general coding method that can be applied to most steganographic schemes to improve their embedding efficiency - the number of message bits embedded per one embedding change. Because smaller number of embedding changes is less likely to disrupt statistic properties of the cover object, schemes that employ matrix embedding generally have better steganographic security. This gain is more important for long messages than for shorter ones because longer messages are easier to detect. Previously introduced approaches to matrix embedding based on Hamming codes are, however, not efficient for long messages. In this paper, we present novel matrix embedding schemes that are efficient for embedding messages close to the embedding capacity. One is based on a family of codes constructed from simplex codes and the second one on random linear codes of small dimension. The embedding efficiency of the proposed methods is evaluated with respect to theoretically achievable bounds.

Original languageEnglish
Title of host publicationSecurity, Steganography, and Watermarking of Multimedia Contents VIII - Proceedings of SPIE-IS and T Electronic Imaging
DOIs
StatePublished - 2006
EventSecurity, Steganography, and Watermarking of Multimedia Contents VIII - San Jose, CA, United States
Duration: Jan 16 2006Jan 19 2006

Publication series

NameProceedings of SPIE - The International Society for Optical Engineering
Volume6072

Conference

ConferenceSecurity, Steganography, and Watermarking of Multimedia Contents VIII
Country/TerritoryUnited States
CitySan Jose, CA
Period01/16/0601/19/06

Keywords

  • Covering codes
  • Matrix embedding
  • Simplex codes
  • Steganography

Fingerprint

Dive into the research topics of 'Matrix embedding for large payloads'. Together they form a unique fingerprint.

Cite this