# An Embedding Strategy Using Q-Ary Convolutional Codes for Large and Small Payloads

^{1}

^{2}

^{3}

^{*}

## Abstract

**:**

## 1. Introduction

## 2. Preliminaries

- Cover for multitone images

- 2
- Embedding scheme and efficiency bound

## 3. Embedding Algorithm for Small and Large Payloads

## 4. Optimal Design for Q-Ary CEs

## 5. Simulation Results

## 6. Conclusions

## Author Contributions

## Funding

## Institutional Review Board Statement

## Informed Consent Statement

## Conflicts of Interest

## References

- Crandall, R. Some Notes on Steganography. Post on Steganography Mailing List. 1998. Available online: http://os.inf.tu-dresden.de/west-feld/crandall.pdf (accessed on 18 June 2021).
- Bierbrauer, J. On Crandall’s Problem. 1998, unpublished. Available online: http://www.ws.binghamton.edu/fridrich/covcodes.pdf (accessed on 18 June 2021).
- Galand, F.; Kabatiansky, G. Information hiding by coverings. In Proceedings of the 2003 IEEE Information Theory Workshop (Cat. No.03EX674), Paris, France, 31 March–4 April 2003 ; pp. 151–154. [Google Scholar] [CrossRef]
- Zhang, W.; Wang, S.; Zhang, X. Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun. Lett.
**2007**, 11, 680–682. [Google Scholar] [CrossRef] - Bierbrauer, J.; Fridrich, J. Constructing good covering codes for applications in Steganography. In LNCS Transactions on Data Hiding and Multimedia Security; Springer: Berlin/Heidelberg, Germany, 2008; Volume 4920, pp. 1–22. [Google Scholar]
- Fridrich, J.; Filler, T. Practical methods for minimizing embedding impact in steganography. In Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, USA, 26 February 2007; Volume 6050, p. 2V3. [Google Scholar]
- Fridrich, J.; Soukal, D. Matrix embedding for large payloads. IEEE Trans. Inf. Forensics Secur.
**2006**, 1, 390–395. [Google Scholar] [CrossRef] [Green Version] - Tseng, Y.-C.; Chen, Y.-Y.; Pan, H.-K. A secure data hiding scheme for binary images. IEEE Trans. Commun.
**2002**, 50, 1227–1231. [Google Scholar] [CrossRef] - Li, R.Y.; Au, O.C.; Lai, K.K.; Yuk, C.K.; Lam, S.-Y. Data hiding with tree based parity check. In Proceedings of the IEEE International Conference, Beijing, China, 2–5 July 2007; pp. 635–638. [Google Scholar]
- Li, R.Y.; Au, O.C.; Yuk, C.K.M.; Yip, S.-K.; Lam, S.-Y. Halftone Image Data Hiding with Block-Overlapping Parity Check. In Proceedings of the 2007 IEEE International Conference on Acoustics, Speech and Signal Processing—ICASSP’ 07, Honolulu, HI, USA, 15–20 April 2007; Volume 2, pp. 193–196. [Google Scholar]
- Chen, J.; Zhu, Y.; Shen, Y.; Zhang, W. Efficient Matrix Embedding Based on Random Linear Codes. In Proceedings of the MINES 2010, Jiangsu, China, 4–6 November 2010; pp. 879–883. [Google Scholar]
- Gao, Y.; Li, X.; Yang, B. Employing optimal matrix for efficient matrix embedding. In Proceedings of the IIH-MSP2009, Kyoto, Japan, 12–14 September 2009; pp. 161–165. [Google Scholar]
- Sch¨onfeld, D.; Winkler, A. Embedding with syndrome coding based on BCH codes. In Proceedings of the ACM 8th Workshop on Multimedia and Security, Geneva, Switzerland, 26–27 September 2006; pp. 214–223. [Google Scholar]
- Wainwright, M.J. Sparse graph codes for side information and binning. IEEE Signal Process. Mag.
**2007**, 24, 47–57. [Google Scholar] [CrossRef] - Wang, J.J.; Chen, H. An Adaptive Matrix Embedding Technique for Binary Hiding with an Efficient LIAE Algorithm. WSEAS Trans. Signal Process.
**2012**, 8, 64–75. [Google Scholar] - Filler, T.; Fridrich, J. Binary quantization using Belief Propagation with decimation over factor graphs of LDGM codes. arXiv
**2007**, arXiv:0710.0192. [Google Scholar]

**Figure 14.**The embedding efficiency between [16] and convolutional embedding codes.

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |

© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).

## Share and Cite

**MDPI and ACS Style**

Wang, J.-J.; Lin, C.-Y.; Yang, S.-C.; Chang, H.-Y.; Lin, Y.-C.
An Embedding Strategy Using Q-Ary Convolutional Codes for Large and Small Payloads. *Mathematics* **2021**, *9*, 1577.
https://doi.org/10.3390/math9131577

**AMA Style**

Wang J-J, Lin C-Y, Yang S-C, Chang H-Y, Lin Y-C.
An Embedding Strategy Using Q-Ary Convolutional Codes for Large and Small Payloads. *Mathematics*. 2021; 9(13):1577.
https://doi.org/10.3390/math9131577

**Chicago/Turabian Style**

Wang, Jyun-Jie, Chi-Yuan Lin, Sheng-Chih Yang, Hsi-Yuan Chang, and Yin-Chen Lin.
2021. "An Embedding Strategy Using Q-Ary Convolutional Codes for Large and Small Payloads" *Mathematics* 9, no. 13: 1577.
https://doi.org/10.3390/math9131577