Skip to main navigation Skip to search Skip to main content

Steganography via codes for memory with defective cells

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Scopus citations

Abstract

Steganography is the art of covert (undetectable) communication in which secret data is embedded in innocuous looking messages by slightly modifying them. The detectability of secret data is inuenced, besides other factors, by the placement of embedding changes within the message and by the embedding efficiency the number of bits embedded per one embedding change. In this paper, we first show that codes for memory with defective cells enable steganographic communication without sharing the placement of embedding changes. This allows construction of a new class of steganographic schemes with improved security. We then describe an efficient coding method for memory with defective cells based on the LT process that is suitable for steganographic applications. In the second part of the paper, we explore a different approach based on random linear codes on small blocks with the goal to decrease the number of embedding changes. The embedding efficiency of this approach is compared to theoretically achievable bounds.

Original languageEnglish
Title of host publication43rd Annual Allerton Conference on Communication, Control and Computing 2005
PublisherUniversity of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering
Pages1521-1537
Number of pages17
ISBN (Electronic)9781604234916
StatePublished - 2005
Event43rd Annual Allerton Conference on Communication, Control and Computing 2005 - Monticello, United States
Duration: Sep 28 2005Sep 30 2005

Publication series

Name43rd Annual Allerton Conference on Communication, Control and Computing 2005
Volume3

Conference

Conference43rd Annual Allerton Conference on Communication, Control and Computing 2005
Country/TerritoryUnited States
CityMonticello
Period09/28/0509/30/05

Keywords

  • Embedding efficiency
  • LT codes
  • Memory with defective cells
  • Random linear codes
  • Steganography

Fingerprint

Dive into the research topics of 'Steganography via codes for memory with defective cells'. Together they form a unique fingerprint.

Cite this