Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674)
DOI: 10.1109/itw.2003.1216717
|View full text |Cite
|
Sign up to set email alerts
|

Information hiding by coverings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
38
0
1

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 62 publications
(39 citation statements)
references
References 4 publications
0
38
0
1
Order By: Relevance
“…We now briefly review a few relevant known facts about embedding schemes and covering codes that appeared in [1], [5] and establish some more terminology. Let M be the set of all messages.…”
Section: Matrix Embedding In Steganographymentioning
confidence: 99%
See 2 more Smart Citations
“…We now briefly review a few relevant known facts about embedding schemes and covering codes that appeared in [1], [5] and establish some more terminology. Let M be the set of all messages.…”
Section: Matrix Embedding In Steganographymentioning
confidence: 99%
“…The matrix embedding theorem is taken from [1], [5] and gives a recipe on how to use an [n, k] code to communicate n − k bits using at most R changes in n pixels.…”
Section: Matrix Embedding In Steganographymentioning
confidence: 99%
See 1 more Smart Citation
“…Crandall for the first time presented a matrix coding technique with improved hiding efficiency [7]. The relation between Stegnographic codes (Stego-codes) and covering codes was studied in [8].…”
Section: Introductionmentioning
confidence: 99%
“…In this case, the distortion is often measured with the number of embedding changes. The average number of bits embedded per one embedding change is called embedding efficiency and it constitutes an important numerical characteristic of a steganographic scheme.By mapping the individual pixels of the cover to elements of a finite field, for example, by associating a bit (or q-ary symbol from finite field F q ) with each pixel value 1 , one can formulate the problem of maximizing embedding efficiency within the framework of coding theory [3], [8]. In particular, it is known that a q-ary linear code C with length n, dimension k, parity check matrix H, and covering radius R can be used to communicate n − k q-ary symbols (or (n − k) lg q bits) in a cover consisting of n elements by making at most R changes in the following manner.…”
mentioning
confidence: 99%