Most current audio steganographic methods are content non-adaptive which have poor security and low embedding capacity. This paper proposes a generalized adaptive huffman code mapping (AHCM) framework for obtaining hi...
详细信息
Most current audio steganographic methods are content non-adaptive which have poor security and low embedding capacity. This paper proposes a generalized adaptive huffman code mapping (AHCM) framework for obtaining higher secure payload. To avoid the frame-offset effect of audio codec, we first establish a distortion-limited suppressible code space, which realizes data embedding by using equal-length entropy codes. Furthermore, a stego key is used to dynamically build huffman code mapping of each frame for improving acoustic imperceptibility and statistical undetectability. We then consider integrating psychoacoustic model (PAM) of intra-frame with frame-level perceptual distortion of inter-frame to obtain minimized total distortion. Finally, we present an implementation of the proposed AHCM framework on MP3 audios. A distortion function based on the PAM and an optimal steganographic frame path are, respectively, devised for adaptively embedding via employing syndrome-trellis codes. Experimental results demonstrate that our approach is, indeed, able to achieve higher secure steganographic capacity and better acoustic concealment. The detection accuracy of 320-kbps-mp3 datasets is lower than 65% when the embedding payload reaches 11 kbps, which is decreased by 11.8%-13.4% than the state-of-the-art steganographic methods.
The concept of local redundancy is introduced and shown that it is a simple but powerful tool for understanding the redundancy of a prefix code. Based on this concept, the redundancy theorem, which gives lower bounds ...
详细信息
The concept of local redundancy is introduced and shown that it is a simple but powerful tool for understanding the redundancy of a prefix code. Based on this concept, the redundancy theorem, which gives lower bounds on the redundancy of a prefix code when the structure of the code is partially known, is proven. It is shown how this theorem can be used to obtain well-known lower bounds on R(Huff), the redundancy of a huffman code. The theorem is used to obtain a sequence of new lower bounds on R(Huff) based on the huffman procedure. A similar sequence of upper bounds or R(Huff) is obtained. New lower and upper bounds on R(Huff) when the two smallest probabilities of the source distribution are known are given as corollaries of these results.
Digital rights management (DRM) system is a promising technique to allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. However, traditional DRMs are achieve...
详细信息
Digital rights management (DRM) system is a promising technique to allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. However, traditional DRMs are achieved with individual function modules of cryptography and watermarking. Therefore, all digital contents are temporarily disclosed in perfect condition via decryption process in the user-side risking illegal redistribution. This paper describes the basic idea of a novel DRM method composed of an incomplete cryptography using invariant huffman code length feature and the user identification mechanism to control the quality of digital contents. The proposed incomplete cryptography consists of two processes: the incomplete encoding and the incomplete decoding. These processes are presented by randomly selecting the coefficients that belong to the same category or different category of huffman code. In our scheme, the copyright information is embedded into the decoded content during the decoding process, and the size of digital contents are invariant during the process. Experimental results with simulation confirmed that the modified codes are compatible with standard JPEG format, and revealed the proposed method to be suitable for DRM in the network distribution system.
For transmission of video signals, it is important that the system allows a certain degree of flexibility in bit rate as well as quality, depending upon the requirements of media and channel conditions. In this paper,...
详细信息
For transmission of video signals, it is important that the system allows a certain degree of flexibility in bit rate as well as quality, depending upon the requirements of media and channel conditions. In this paper, we discuss the hierarchical transmission of huffman code using multi-code/multi-rate DS/SS system to realize flexible transmission. We first discuss and show that the structure of huffman code tree directly expresses hierarchical structure, and that parallel transmission of huffman code can achieve hierarchical transmission. By assigning different transmission data rate to the bits in each stratum, it is possible to transmit different amount of information from each stratum. Further, we show the quality of each of the stratum can easily controlled by an appropriate power distribution to each parallel transmission branch.
For a given independent and identically distributed (i.i.d.) source, huffman code achieves the optimal average codeword length in the class of instantaneous codes with a single code table. However, it is known that th...
详细信息
For a given independent and identically distributed (i.i.d.) source, huffman code achieves the optimal average codeword length in the class of instantaneous codes with a single code table. However, it is known that there exist time-variant encoders, which achieve a shorter average codeword length than the huffman code, using multiple code tables and allowing at most k-bit decoding delay for k = 2, 3, 4, . . .. On the other hand, it is not known whether there exists a 1-bit delay decodable code, which achieves a shorter average length than the huffman code. This paper proves that for a given i.i.d. source, a huffman code achieves the optimal average codeword length in the class of 1-bit delay decodable codes with a finite number of code tables.
It is known that a bound on the probability that the length of any source code will be shorter than the self information by gamma-bits can be obtained using a Chebychev-type argument. From this bound, one can establis...
详细信息
It is known that a bound on the probability that the length of any source code will be shorter than the self information by gamma-bits can be obtained using a Chebychev-type argument. From this bound, one can establish the competitive optimality of the self information and of the Shannon-Fano code (up to one bit). In general, however, the huffman code cannot be examined using this technique. Nevertheless, in this correspondence the competitive optimality (up to one bit) of the huffman code for general sources is also established using a different technique.
This paper describes the basic idea of a novel Digital Rights Management(DRM) method which is composed of an incomplete cryptography using invariant huffman code length feature and the user identification mechanism to...
详细信息
ISBN:
(纸本)9780769546513
This paper describes the basic idea of a novel Digital Rights Management(DRM) method which is composed of an incomplete cryptography using invariant huffman code length feature and the user identification mechanism to control the quality of the digital contents. We adopt the huffman code length feature of the DCT coefficient in the JPEG codec to the implement incomplete cryptography. The encoding process and the decoding process are presented by randomly selected the coefficients that belong to same category in the huffman table. In the our scheme, the copyright information is embedded into the decoded content while decoding process, and the size of digital contents are invariance during process. Experimental results with simulation confirmed that the modified codes keep compatibility with standard JPEG format, and revealed the proposed method is suitable for DRM in the network distribution system.
A new entropy codec, which can recover quickly from the loss of synchronization due to the, occurrence of transmission errors, is proposed and applied to wireless image transmission in this research. This entropy code...
详细信息
ISBN:
(纸本)0819429155
A new entropy codec, which can recover quickly from the loss of synchronization due to the, occurrence of transmission errors, is proposed and applied to wireless image transmission in this research. This entropy codec is designed based on the huffman code with a careful choice of the assignment of 1's and 0's to each branch of the huffman tree. The design satisfies the suffix-rich property, i.e. the number of a codeword to be the suffix of other codewords is maximized. After the huffman coding tree is constructed, the source can be coded by using the traditional huffman code. Thus, this coder does not introduce Rnv overhead to sacrifice its coding efficiency. Statistically, the decoder can automatically recover the lost synchronization with the shortest error propagation length. Experimental results show that fast synchronization recovery reduces quality degradation on the reconstructed image while maintaining the same coding efficiency.
We present here a novel steganographic method based on huffman coding and the least significant bit substitution in order to provide high embedding capacity, a strong security and imperceptible visual quality to secre...
详细信息
ISBN:
(纸本)9783319041261;9783319041254
We present here a novel steganographic method based on huffman coding and the least significant bit substitution in order to provide high embedding capacity, a strong security and imperceptible visual quality to secret message. Every eight bits of the secret image are first encoded by building a huffman tree. After that those encoded bits of secret image are divided into 4 groups. Each part has a decimal value between 0 to 3. These decimal values determine the location where to embed the message in a particular pixel of cover image. To embed the message we just put a one in the corresponding location in a pixel of the cover image which identified by the decimal values of the secret image. Since huffman Table reduces the size of the original image, an attacker cannot easily recover from the stego image those fine details of the original image that would enable him to mount a reliable attack. We have got comparable visual quality as the Peak Signal to Noise Ratio values lie between 30 dB to 31 dB.
A nonuniform QAM GFDM RoF system based on probabilistic shaping with huffman code is proposed. Simulation results show that the proposed system obtains better BER performance than uniform QAM schemes.
ISBN:
(纸本)9781538661581
A nonuniform QAM GFDM RoF system based on probabilistic shaping with huffman code is proposed. Simulation results show that the proposed system obtains better BER performance than uniform QAM schemes.
暂无评论