1 %STC_EMBED Embeds message into cover bitstring using Syndrome-Trellis Codes.
\r
3 % [D Y] = STC_EMBED(X, MSG, COSTS) embeds message bit-string MSG into
\r
4 % bit-string X. Cost of changing X(i) is COSTS(i). Use Syndrome-Trellis
\r
5 % Codes with constraint height 10. Outputs stego bit-stream Y and total
\r
8 % [D Y] = STC_EMBED(X, MSG, COSTS, H) same as above, but uses STC of
\r
9 % constraint height H.
\r
12 % X, MSG - vectors of type uint8
\r
13 % COSTS - vector of type double
\r
14 % H - scalar between 6 and 15 (a higher number means bigger
\r
15 % efficiency but longer embedding time), default is 10.
\r
17 % Use STC_EXTRACT(Y, H) to read the message.
\r
21 % STC Toolbox website: http://dde.binghamton.edu/filler/stc
\r
24 % [1] T. Filler, J. Judas, J. Fridrich, "Minimizing Additive Distortion in
\r
25 % Steganography using Syndrome-Trellis Codes", submitted to IEEE
\r
26 % Transactions on Information Forensics and Security, 2010.
\r
27 % http://dde.binghamton.edu/filler/pdf/Fill10tifs-stc.pdf
\r
29 % [2] T. Filler, J. Judas, J. Fridrich, "Minimizing Embedding Impact in
\r
30 % Steganography using Trellis-Coded Quantization", Proc. SPIE,
\r
31 % Electronic Imaging, Media Forensics and Security XII, San Jose, CA,
\r
32 % January 18-20, 2010.
\r
33 % http://dde.binghamton.edu/filler/pdf/Fill10spie-syndrome-trellis-codes.pdf
\r
35 % [3] T. Filler, J. Fridrich, "Minimizing Additive Distortion Functions
\r
36 % With Non-Binary Embedding Operation in Steganography", 2nd IEEE
\r
37 % Workshop on Information Forensics and Security, December 2010.
\r
38 % http://dde.binghamton.edu/filler/pdf/Fill10wifs-multi-layer-stc.pdf
\r
40 % See also STC_EXTRACT, STC_PM1_PLS_EMBED, STC_PM1_DLS_EMBED,
\r
41 % STC_PM2_PLS_EMBED, STC_PM2_DLS_EMBED.
\r