A NEW STEGANOGRAPHIC SCHEME
BASED ON FIRST ORDER REED MULLER CODES
A New Steganographic Scheme
Houda Jouhari and El Mamoun Souidi
Laboratoire de Math´ematiques, Informatique et Applications, Facult´e des Sciences, Universit´e Mohammed V-Agdal
B. P. 1014, Rabat, Morocco
Keywords:
Steganography, Error correcting codes, Reed-Muller codes R M (1,m), Boolean functions.
Abstract:
Reed-Muller codes are widely used in communications and they have fast decoding algorithms. In this paper
we present an improved data hiding technique based on the first order binary Reed-Muller syndrome coding.
The proposed data hiding method can hide the same amount of data as known methods with reduction of time
complexity from 2
m
(2
m
− 1)2
m+1
binary operations to 2
m
(2
m
− 1)m binary operations .
1 INTRODUCTION
Steganographyis the art and science of invisible com-
munications. It is used, sometimes together with
cryptography, to protect information from unwanted
third parties. In contrast with cryptography, where
the enemy is able to detect, intercept and modify the
transmitted information (Kahn, 1996), steganography
is used primarily when the fact of communicating
needs to be kept secret. This is accomplished by em-
bedding the secret messages within another, appar-
ently innocuous, messages (called covers). Today’s
typical covers are computer files, mainly (due to the
limited power of human visual and hearing systems)
image, video and audio files; but in fact, whatever
an electronic document contains irrelevant or redun-
dant information, it can be used as a cover for hid-
ing secrets. For example, despite their known weak-
nesses, the most popular steganographic systems are
LSB (least significant bit) techniques. In its more el-
ementary form, the encoder select a pixel of a bitmap
image and replaces its LSB by a bit of information.
More elaborated versions allow to hide information
in JPEG and other format images.
Now-days , steganographic techniques are used in
order to guarantee security and privacy on open sys-
tems (as the Internet). They play also a role in elec-
tronic commerce, where they are used to prevent il-
legal uses of digital information (by means of water-
marking for example, see (Cox et al., 2007)). For a
more complete description of uses and applications
of steganography, see (Bender et al., 2000), (Moulin
and Koetter, 2005).
The design of a steganographic system has (at
least) two facets: firstly, the choice of accurate cov-
ers and the search for strategies to modify them in an
imperceptible way; this study relies on a variety of
methods, including psycho-visual and statistical cri-
teria. Secondly, the design of efficient algorithm for
embedding and extracting the information. Here we
concentrate our attention on this last problem.
Our goal in this paper is to improve the efficiency
of these embedding/retrievalalgorithms by using cod-
ing theory techniques to construct new and more ef-
ficient algorithms. Recall that error-correcting codes
are commonly used for detecting and correctingerrors
in data transmission. Their use in steganography is
not new. It was first suggested by Crandall (Crandall,
1998) who called it matrix encoding and later implic-
itly used by Westfeld in the design of F5 (Westfeld,
2001).
There exists a close relationship between stegano-
graphic protocols and error correcting codes. Since
error-correcting codes can be used to construct good
steganographic protocols and study their properties.
An explicit description of the relationship between
error-correcting codes and steganographic systems
was treated in (Zhang and Li, 2008), (Munuera,
2007).
Here, we propose to focus on a particular family
of error correcting codes: the first-order binary Reed-
Muller codes denoted R M (1,m). Theses codes are
widely used in communications over long distances, a
Reed Muller code was used by Mariner 9 to transmit
351
Jouhari H. and Souidi E..
A NEW STEGANOGRAPHIC SCHEME BASED ON FIRST ORDER REED MULLER CODES - A New Steganographic Scheme.
DOI: 10.5220/0003512703510356
In Proceedings of the International Conference on Security and Cryptography (SECRYPT-2011), pages 351-356
ISBN: 978-989-8425-71-3
Copyright
c
2011 SCITEPRESS (Science and Technology Publications, Lda.)