Semi-fragile watermarking in speech signals is proposed to solve problems relating to unauthorized speech modification. However, previous methods are fragile against some non-malicious attacks or white noise with a hi...
详细信息
ISBN:
(纸本)9781665409476
Semi-fragile watermarking in speech signals is proposed to solve problems relating to unauthorized speech modification. However, previous methods are fragile against some non-malicious attacks or white noise with a high signal-to-noise ratio. This paper aims to solve this problem by proposing a new watermarking technique based on singular spectrum analysis and quantization index modulation. The singular spectrum analysis is used to extract singular values of segments of speech signals. A watermark bit is embedded into each frame by slightly modifying its singular values according to the quantization index modulation. The experimental results show that the sound quality of a watermarked signal is comparable to that of its original signal. The watermark-bit extraction precision is also similar to that of existing methods. However, the proposed method is robust against non-malicious attacks, such as G.726 speech codec and white noise with a high signal-to-noise ratio.
This work proposes a semi-fragile, blind watermarking scheme in spatial domain to substantiate the authenticity of 3D models. The 3D mesh is first traversed with a topology-oriented strategy which also decides the ver...
详细信息
This work proposes a semi-fragile, blind watermarking scheme in spatial domain to substantiate the authenticity of 3D models. The 3D mesh is first traversed with a topology-oriented strategy which also decides the verification units. Every verification unit comprises of a set of embedding eligible vertices and one verification code embeddable vertex. Watermark embedding is carried out by first applying dither modulation to the spherical angular values theta () and phi (phi) of the embedding eligible vertices. During the process of dithering, the angular values are quantized with 3D-MDAQIM using quantization step sizes and phi that incurs minimum distortion. A theoretical analysis is conducted to present the imperceptibility assessment. In order to verify the integrity of the 3D model, verification bits are computed from the local geometry of the mesh and embedded to the respective embeddable vertices using message digit substitution scheme. Further more, experimental results show that the proposed method yields minimal distortion with regional attack localization capability. This work performs better than the state-of-the-art semi-fragile mesh watermarking algorithms in terms of embedding capacity, robustness toward content-preserving attacks and distortion control.
quantization index modulation Steganography (QIMS) is an important category of steganography methods for low-bit-rate compressed speech. Early QIMS utilized independent codewords for embedding. Recently, new Joint Cod...
详细信息
quantization index modulation Steganography (QIMS) is an important category of steganography methods for low-bit-rate compressed speech. Early QIMS utilized independent codewords for embedding. Recently, new Joint Codeword QIMS (JC-QIMS) methods have been proposed. Such methods have higher embedding efficiency and steganography security than Independent Codeword QIMS (IC-QIMS) methods. Current steganalysis methods can detect IC-QIMS effectively, but the detection accuracy for JC-QIMS is unsatisfactory, especially at low embedding rates. To improve this accuracy, a novel steganalysis method based on a newly developed Codeword Bayesian Network (CBN) is proposed. The CBN is constructed based on the probability distribution and the steganography-sensitive transition relationships of codewords. The network parameters are learned by utilizing the Dirichlet distribution as the prior distribution. Extensive experiments are conducted with multiple embedding rates, multiple speech lengths and different network complexities. The experimental results demonstrate that the proposed method outperforms the state-ofthe-art QIM steganalysis method against JC-QIMS. In particular, our algorithm achieves good detection results even at relatively low embedding rates. Moreover, it is proved that our method is also effective for the steganalysis of IC-QIMS. (C) 2018 Elsevier B.V. All rights reserved.
Video information hiding and transmission over noisy channels leads to errors on video and degradation of the visual quality notably. In this paper, a video signal fusion scheme is proposed to combine sensed host sign...
详细信息
Video information hiding and transmission over noisy channels leads to errors on video and degradation of the visual quality notably. In this paper, a video signal fusion scheme is proposed to combine sensed host signal and the hidden signal with quantization index modulation (QIM) technology in the compressive sensing (CS) and discrete cosine transform (DCT) domain. With quantization based signal fusion, a realistic solution is provided to the receiver, which can improve the reconstruction video quality without requiring significant extra channel resource. The extensive experiments have shown that the proposed scheme can effectively achieve the better trade-off between robustness and statistical invisibility for video information hiding communication. This will be extremely important for low-resolution video analytics and protection in big data era.
In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method,this pape...
详细信息
In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method,this paper proposes an image steganography algorithm based on quantization index modulation resisting both scaling attacks and statistical *** the spatial image,this paper uses the watermarking algorithm based on quantization index modulation to extract the embedded *** construct the embedding distortion function of the new embedded domain based on S-UNIWARD steganography,and use the minimum distortion coding to realize the embedding of the secret ***,according to the embedding modification amplitude of secret messages in the new embedded domain,the quantization index modulation algorithm is applied to realize the final embedding of secret messages in the original embedded *** experimental results show that the algorithm proposed is robust to the three common interpolation attacks including the nearest neighbor interpolation,the bilinear interpolation and the bicubic *** the average correct extraction rate of embedded messages increases from 50%to over 93% after 0.5 times-fold scaling attack using the bicubic interpolation method,compared with the classical steganography algorithm *** the algorithm proposed has higher detection resistance than the original watermarking algorithm based on quantization index modulation.
In this paper, we propose an efficient transform-based blind audio watermarking technique by introducing a parametric quantization index modulation (QIM). Theoretical expressions for the signal to watermark ratio and ...
详细信息
In this paper, we propose an efficient transform-based blind audio watermarking technique by introducing a parametric quantization index modulation (QIM). Theoretical expressions for the signal to watermark ratio and probability of error are derived and then used in an optimization technique based on the Lagrange multipliers method to find the optimal values for the parameters of the parametric QIM that ensure the imperceptibility while maximizing the robustness under an additive white Gaussian noise (AWGN) attack. Moreover, a fast scheme for the implementation of the proposed watermarking technique is developed and an efficient procedure is suggested to find the interval for the best selection of the watermark embedding positions that provide a good trade-off between the effects of high and low pass filtering attacks. The parameters of the resulting optimal parametric QIM coupled with the embedding positions constitute a highly robust secret key for the proposed watermarking technique. We also carry out several experiments to show the usefulness of the theoretical analysis presented in the paper and compare the proposed technique with other existing QIM-based watermarking techniques by considering known attacks such as AWGN, re-quantization, resampling, low/high pass filtering, amplitude scaling and common lossy compressions.
This paper presents a new approach for digital Speech Steganography and watermarking in the speech signal. In the proposed approach, quantization index modulation is applied on one of the speech signal feature called ...
详细信息
ISBN:
(纸本)9781509043811
This paper presents a new approach for digital Speech Steganography and watermarking in the speech signal. In the proposed approach, quantization index modulation is applied on one of the speech signal feature called as line spectral frequency to indicate the pattern of watermark in each frame of the speech signal. Steganographic data or watermarked information is conveyed through the silence part of the speech signal. The pattern generated using QIM in line spectral frequency (LSF) of the speech gives the information about the existence of steganography or watermarking in the silence part of the speech signal. The blind detection technique is used at the receiver to detect the pattern generated at the transmitter side to identify steganography or authenticity in the speech signal. Various subjective and objective analysis are carried out on a dither modulated speech to evaluate its performance and also the robustness of the same is verified by applying a different types of communication attacks on it. The performance measures are shown in terms of set of tables and graphs. It is observed from the obtained results that, the results of different speech quality assessment parameter as well as the parameters denoting the hiding capacity of each wave file of different speakers are quite good and satisfactory.
Watermarks are used to protect the copyright of multimedia and help us to identify legitimate ownership. Imperceptibility and robustness are always prime concern for the watermarking researchers. Therefore, a simple b...
详细信息
ISBN:
(纸本)9781509040933
Watermarks are used to protect the copyright of multimedia and help us to identify legitimate ownership. Imperceptibility and robustness are always prime concern for the watermarking researchers. Therefore, a simple but effective blind watermarking scheme would be what we expect. In this study, we present a kind of blind watermarking technique, which is based on inter-blocks estimation of the discrete cosine transform (DCT) coefficients. To satisfy both imperceptibility and robustness requirements while maintaining a sufficient payload capacity, a quantization index modulation technique (QIM) DCT-based scheme is employed. This technique substantial reduces the effect of host data interference, thus having significant advantage over previously proposed DCTbased watermarking schemes. Experimental results show that the proposed scheme to embedding watermarks can effectively to defense various image attacks, especially in image compression attacks and Gaussian noise.
A highly transparent steganography scheme of speech signals into color images based on quantization index modulation (QIM) is presented in this paper. The proposed method takes advantage of the low distortion in the h...
详细信息
ISBN:
(纸本)9783319393933;9783319393926
A highly transparent steganography scheme of speech signals into color images based on quantization index modulation (QIM) is presented in this paper. The proposed method takes advantage of the low distortion in the host image introduced by the scalar quantization of its wavelet coefficients. The stego image is highly similar to the host image, and the secret content is imperceptible. The secret message is recovered at the receiver with high correlation to the original speech signal. For the purpose of increasing the security of the system, an external mask is used to encrypt the secret content before the embedding process. Several tests were carried out in order to quantify the influence of the size of the quantizer (delta) on the quality of the recovered secret content and the transparency of the stego image.
We propose a method of spread spectrum digital watermarking with quantization index modulation (QIM) and evaluate the method on the basis of IHC evaluation criteria. The spread spectrum technique can make watermarks r...
详细信息
We propose a method of spread spectrum digital watermarking with quantization index modulation (QIM) and evaluate the method on the basis of IHC evaluation criteria. The spread spectrum technique can make watermarks robust by using spread codes. Since watermarks can have redundancy, messages can be decoded from a degraded stego-image. Under IHC evaluation criteria, it is necessary to decode the messages without the original image. To do so, we propose a method in which watermarks are generated by using the spread spectrum technique and are embedded by QIM. QIM is an embedding method that can decode without an original image. The IHC evaluation criteria include JPEG compression and cropping as attacks. JPEG compression is lossy compression. Therefore, errors occur in watermarks. Since watermarks in stego-images are out of synchronization due to cropping, the position of embedded watermarks may be unclear. Detecting this position is needed while decoding. Therefore, both error correction and synchronization are required for digital watermarking methods. As countermeasures against cropping, the original image is divided into segments to embed watermarks. Moreover, each segment is divided into 8 x 8 pixel blocks. A watermark is embedded into a DCT coefficient in a block by QIM. To synchronize in decoding, the proposed method uses the correlation between watermarks and spread codes. After synchronization, watermarks are extracted by QIM, and then, messages are estimated from the watermarks. The proposed method was evaluated on the basis of the IHC evaluation criteria. The PSNR had to be higher than 30 dB. Ten 1920x1080 rectangular regions were cropped from each stego-image, and 200-bit messages were decoded from these regions. Their BERs were calculated to assess the tolerance. As a result, the BERs were less than 1.0%, and the average PSNR was 46.70 dB. Therefore, our method achieved a high image quality when using the IHC evaluation criteria. In addition, the proposed
暂无评论