Using of Polar Codes in Steganography
Idy Diop, Birahime Diouf, Sidi Mohamed Farssi, K. Tall, P.A. Fall, A.K. Diop, K. Sylla
Available Online July 2013.
- https://doi.org/10.2991/cse.2013.59How to use a DOI?
- linear programming, matrix embedding, polar codes, steganography, wet paper codes.
- In this paper, we propose a new steganographic scheme based on the polar codes. The scheme works according to two steps. The first offers a stego vector from given cover vector and message. The stego vector provided by the first method can be the optimal; in this case, the insertion is successful with a very low complexity. Otherwise, we formalize our problem in a linear program form with initial solution the stego vector given by the first method, to converge to the optimal solution. Our scheme works with the case of a constant profile as well with any profile; it is then adapted to the case of wet paper. Tests on multiple gray scale images showed its good performance in terms of minimizing the embedding impact.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Idy Diop AU - Birahime Diouf AU - Sidi Mohamed Farssi AU - K. Tall AU - P.A. Fall AU - A.K. Diop AU - K. Sylla PY - 2013/07 DA - 2013/07 TI - Using of Polar Codes in Steganography BT - 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013) PB - Atlantis Press SP - 264 EP - 268 SN - 1951-6851 UR - https://doi.org/10.2991/cse.2013.59 DO - https://doi.org/10.2991/cse.2013.59 ID - Diop2013/07 ER -