28 May 2013 High capacity embedding with indexed data recovery using adjunctive numerical relations in multimedia signal covers
Author Affiliations +
We introduce a technique for covertly embedding data throughout an audio file using redundant number system decomposition across non-standard digital bit-lines. This bit-line implementation integrates an index recoverable embedded algorithm with an extended bit level representation that achieves a high capacity data channel within an audio multimedia file. It will be shown this new steganography method has minimal aural distortive affects while preserving both first and second order cover statistics, making it less susceptible to most steganalysis attacks. Our research approach involves reviewing the common numerical methods used in common binary-based algorithms. We then describe basic concepts and challenges when attempting to implement complex embedding algorithms that are based on redundant number systems. Finally, we introduce a novel class of numerical based multiple bit-line decomposition systems, which we define as Adjunctive Numerical Representations. The system is primarily described using basic PCM techniques in uncompressed audio files however extended applications for alternate multimedia is addressed. This new embedding system will not only provide the statistical stability required for effective steganography but will also give us an improvement in the embedding capacity in this class of multimedia carrier files. This novelty of our approach is demonstrated by an ability to embed high capacity covert data while simultaneously providing a means for rapid, indexed data recovery.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
James C. Collins, James C. Collins, Sos S. Agaian, Sos S. Agaian, "High capacity embedding with indexed data recovery using adjunctive numerical relations in multimedia signal covers", Proc. SPIE 8755, Mobile Multimedia/Image Processing, Security, and Applications 2013, 87550L (28 May 2013); doi: 10.1117/12.2015617; https://doi.org/10.1117/12.2015617

Back to Top