Matrix embedding is a high performance technique for steganography. In the paper, we present one new approaches to matrix embedding based on a convolutional code binary nested embedding scheme. This scheme offers a pr...
详细信息
ISBN:
(纸本)9783319045733;9783319045726
Matrix embedding is a high performance technique for steganography. In the paper, we present one new approaches to matrix embedding based on a convolutional code binary nested embedding scheme. This scheme offers a practical method to realization of embedding algorithm and minimizes the average modified distortion by use of Viterbi quantizer between stego and host object. The novel algorithm performs an embedding procedure through a trellis structure based on generator matrix. Systematic convolutional code and nested structure are adopted to achieve realization of embedding algorithm. In this work, the coding technique proposed is validated as a simple and efficient algorithm.
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, where the decoding regions rely implicitl...
详细信息
ISBN:
(纸本)9781457705397
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, where the decoding regions rely implicitly on the distribution of the host signal, are first formulated. In order to perform informed coding, different decoding regions are associated with the same message using an appropriate partitioning function. The minimization of the embedding distortion is afterwards casted into an optimal transport problem. Three new secure embeddings are presented and the performances of the proposed embedding functions regarding the AWGN channel for different WCRs are evaluated. Depending on the embedding and noise distortions, informed secure coding can outperform classical secure coding or classical insecure coding such as ISS or SCS.
Several new video and image watermarking proposals are based on informed coding and informed Embedding. However, these systems can be not easily used in fingerprinting schemes because they do not satisfy the marking a...
详细信息
ISBN:
(纸本)9783540748281
Several new video and image watermarking proposals are based on informed coding and informed Embedding. However, these systems can be not easily used in fingerprinting schemes because they do not satisfy the marking assumption defined in [1]. In this paper we discuss some guidelines to adapt a watermarking system based on informed coding and informed embedding to a generic fingerprinting code, while keeping up with the marking assumption, that is to say, when as a result of one collusion attack of two users, that have different marks that represent the value 0 in the nth position, we have a pirate mark wich represents the 0 value in this same nth position. This can be achieved modifying the work of Miller, Doer and Cox in [2].
We describe a new watermarking system based on the principles of informed coding and informed embedding. This system is capable of embedding 1380 bits of information in images with dimensions 240 x 368 pixels. Experim...
详细信息
We describe a new watermarking system based on the principles of informed coding and informed embedding. This system is capable of embedding 1380 bits of information in images with dimensions 240 x 368 pixels. Experiments on 2000 images indicate the watermarks are robust to significant valumetric distortions, including additive noise, low-pass filtering, changes in contrast, and lossy compression. Our system encodes watermark messages with a modified trellis code in which a given message may be represented by a variety of different signals, with the embedded signal selected according to the cover image. The signal is embedded by an iterative method that seeks to ensure the message will not be confused with other messages, even after addition of noise. Fidelity is improved by the incorporation of perceptual shaping into the embedding process. We show that each of these three components improves performance substantially.
In this paper, we show that the communication channel known as writing in memory with defective cells is a relevant information-theoretical model for a specific case of passive warden steganography when the sender emb...
详细信息
In this paper, we show that the communication channel known as writing in memory with defective cells is a relevant information-theoretical model for a specific case of passive warden steganography when the sender embeds a secret message into a subset C of the cover object X without sharing C with the recipient. The set C, which is also called the selection channel, could be arbitrary, determined by the sender from the cover object using a deterministic, pseudo-random, or a, truly random process. We call this steganography "writing on wet paper" and realize it using a simple variable-rate random linear code that gives the sender a convenient flexibility and control over the embedding process and is thus suitable for practical implementation. The importance of the wet paper scenario for covert communication is discussed within,the context of adaptive steganography and perturbed quantization steganography. Heuristic arguments supported by tests using blind steganalysis indicate that the wet paper steganography provides improved steganographic security and is less vulnerable to steganalytic attacks compared with existing methods with shared selection channels.
Video watermarking has been in research for the past few years. Most of the video watermarking techniques is based on image watermarking, Watermarking a video signal does present more issues than a simple image. Blind...
详细信息
ISBN:
(纸本)9789806560604
Video watermarking has been in research for the past few years. Most of the video watermarking techniques is based on image watermarking, Watermarking a video signal does present more issues than a simple image. Blind detection and real time recovery of a video, lead to the computational complexity and are the major areas to focus. This paper addresses a multimodal technique for robust video-to-video watermarking that reduces the issues related to blind detection of watermark This method uses informed coding for with video watermarking to improve the robustness of the retrieved video watermark The SNR for the watermarked video to original video is found to be low, since the dirty paper coding itself will add some noise.
Current research on data hiding is more and more demonstrating that many applications can benefit from these technologies: among these, medical data management. Current medical record formats store in separated fields...
详细信息
ISBN:
(纸本)0819448206
Current research on data hiding is more and more demonstrating that many applications can benefit from these technologies: among these, medical data management. Current medical record formats store in separated fields image data, and the textual information, so that the link between image and patient occasionally could get mangled by protocol converters or tampering attacks. Moreover, if an intruder can access to the database, he is able to modify the attached text. Embedding patient's information directly into the image through data hiding technology can represent an useful safety measure. Data hiding technologies suitable for such an application must satisfy specific requirements, the most important are: a high payload reliably identifying a patient;the preservation of the quality of the host medical image, the robustness to content modification. According to this analysis, a comparison between different data hiding approaches will be presented, to evaluate the most suitable algorithms for medical applications. In particular two different kind of algorithms will be taken into account: one algorithm based on Bayes theory will be compared with algorithms following the new approach of modelling data hiding as communication with side-information at the transmitter. These methods will be tested and compared in the framework of medical data management in order to identify benefits and drawbacks of both the different approaches for such an application
暂无评论