Download - It Imp 03
-
8/3/2019 It Imp 03
1/9
1st class
The terminology used here will follow the guides given in [33]:
It is known as embedded information or hidden information, the
information which is secretly sent.
The audio track, image, video, text, or in essence, the data among
which the information is to be embedded, receives the name of carrier or
cover. Depending on the specific kind of cover, one can also say cover
audio, cover image, etc.
The object resulting of the insertion of the information to embed into
the carrier is called stego-object. As before, the terms stego-audio, stego-
image, etc. can also be used.
The key (which may have been) used in the process is known as stego-
key, although when the context does not give place to doubts, just key
can be used.
---Steganography(stego) is hide secrets
----A steganographic method consists of an embedding algorithmand an extraction algorithm.
---The embedding algorithm describes how to hide a message intothe cover object.
----The extraction algorithm illustrates how to extract themessage from the stego object.
----To reduce distortion on a cover object based on a tree structure is called tree
based parity check (TBPC)
-
8/3/2019 It Imp 03
2/9
-------- The toggle criteria of a node in the TBPC method can be relaxed
by the strategy of majority vote.
---------Our strategy inherits the efficiency of the TBPC method and
produces a stego object with least distortion under the tree based parity
check model.
-------The embedding efficiency is defined to be the number of hidden
message bits per embedding modification.
-------Higher embedding efficiency implies better undetectability for
steganographic methods.-------The lower embedding efficiency is defined to be the ratio of the
number of hidden message bits to the maximum embedding
modifications.
--------The lower embedding efficiency is related to undetectability in the
worst case. It implies steganographic security in the worst case. Thus,
the lower embedding efficiency is also an important security factor for a
steganographic system.
-
8/3/2019 It Imp 03
3/9
2nd class
---------Before embedding and extraction, a location finding method determines a
sequence of locations that point to elements in the cover object.
-----------The embedding algorithm modifies the elements in these locations to hide
the message
------------the extraction algorithm can recover the message by inspecting the same
sequence of locations.
---------The TBPC (tree based parity check )method is a least significant bit (LSB)steganographic method.
------Only the LSBs of the elements pointed by the determined locations
are used for embedding and extraction.
-----The TBPC method constructs a complete N-ary tree, called the
master tree, to represent the LSBs of the cover object.
-----Then it fills the nodes of the master tree with the LSBs of the cover
object level by level, from top to bottom and left to right. Every node of
the tree corresponds to an LSB in the cover object. Denote the number
of leaves of the master tree by L.
------The TBPC embedding algorithm derives an L-bit binary string,
called the master string, by performing parity check on the master tree
from the root to the leaves (e.g. see Figure 1.).
------The embedding algorithm hides the message by modifying the bit values of
some nodes in the master tree.
-----Assume that the length of the message is also L. Performing the bitwise
exclusive-or operation between the message and the master string, we obtain a
toggle string (e.g. see Figure 1).
-
8/3/2019 It Imp 03
4/9
----------Then the embedding algorithm constructs a new complete N-ary tree,
called the toggle tree in the bottom-up order and fills the leaves with the bit values
of the toggle string and the other nodes with 0.
-
8/3/2019 It Imp 03
5/9
---------Then level by level, from the bottom to the root, each non-leaf node
together with its child nodes are flipped if all its child nodes have bits 1 (e.g. see
Figure 2).
-------The embedding algorithm obtains the stego tree by performing exclusive-or
between the master tree and the toggle tree (e.g. see Figure 3).
-
8/3/2019 It Imp 03
6/9
------The TBPC extraction algorithm is simple. We can extract the message by
performing parity check on each root-leaf path of the stego tree from left to right.
-
8/3/2019 It Imp 03
7/9
N-ary Trees
In the preceding section we considered trees in which the nodes can have arbitrary
degrees. In particular, the general case allows each of the nodes of a tree to have a
different degree. In this section we consider a variation in which all of the nodes ofthe tree are required to have exactly the same degree.
Unfortunately, simply adding to Definition the additional requirement that all of the
nodes of the tree have the same degree does not work. It is not possible to construct a
tree which has a finite number of nodes all of which have the same degreeNin anycase except the trivial case ofN=0. In order to make it work, we need to introduce the
notion of an empty tree as follows:
Definition (N-ary Tree) AnN-ary tree Tis a finite set ofnodes with the following
properties:
1. Either the set is empty, ; or
2. The set consists of a root,R, and exactlyNdistinctN-ary trees.
That is, the remaining nodes are partitioned into subsets, ,
, ..., , each of which is anN-ary tree such that
.
According to Definition , anN-ary tree is either the empty tree, , or it is a non-empty set of nodes which consists of a root and exactlyNsubtrees. Clearly, the emptyset contains neither a root, nor any subtrees. Therefore, the degree of each node of
anN-ary tree is either zero orN.
There is subtle, yet extremely important consequence of Definition that often goes
unrecognized. The empty tree, , is a tree. That is, it is an object of the same type
as a non-empty tree. Therefore, from the perspective of object-oriented program
design, an empty tree must be an instance of some object class. It is inappropriate to
use the null reference to represent an empty tree, since the null reference refers to
nothing at all!
The empty trees are called external nodes because they have no subtrees and
therefore appear at the extremities of the tree. Conversely, the non-empty trees are
called internal nodes .
Figure shows the following tertiary (N=3) trees:
http://www.brpreiss.com/books/opus5/html/page257.html#figtree3http://www.brpreiss.com/books/opus5/html/page257.html#defnnarytreehttp://www.brpreiss.com/books/opus5/html/page257.html#defnnarytreehttp://www.brpreiss.com/books/opus5/html/page253.html#defntree -
8/3/2019 It Imp 03
8/9
In the figure, square boxes denote the empty trees and circles denote non-empty
nodes. Except for the empty trees, the tertiary trees shown in the figure contain the
same sets of nodes as the corresponding trees shown in Figure .
Figure: Examples ofN-ary trees.
http://www.brpreiss.com/books/opus5/html/page253.html#figtree1 -
8/3/2019 It Imp 03
9/9
3rd class
MAJORITY VOTE STRATEGY
Two critical issues for a steganographic method are: (1) reducing distortion on cover objects, and
(2) better efficiency for embedding and extraction. We give a majority vote strategy on building
the toggle tree. It uses the least number of 1s under the tree based parity check model. Since the
number of 1s in the toggle tree is the number of modifications on the master tree (i.e., the cover
object), the majority vote strategy can produce a stego tree with least distortion on the master
tree.