Efficient blind decoders for additive spread spectrum embedding based data hiding
نویسندگان
چکیده
This article investigates efficient blind watermark decoding approaches for hidden messages embedded into host images, within the framework of additive spread spectrum (SS) embedding based for data hiding. We study SS embedding in both the discrete cosine transform and the discrete Fourier transform (DFT) domains. The contributions of this article are multiple-fold: first, we show that the conventional SS scheme could not be applied directly into the magnitudes of the DFT, and thus we present a modified SS scheme and the optimal maximum likelihood (ML) decoder based on the Weibull distribution is derived. Secondly, we investigate the improved spread spectrum (ISS) embedding, an improved technique of the traditional additive SS, and propose the modified ISS scheme for information hiding in the magnitudes of the DFT coefficients and the optimal ML decoders for ISS embedding are derived. We also provide thorough theoretical error probability analysis for the aforementioned decoders. Thirdly, sub-optimal decoders, including local optimum decoder (LOD), generalized maximum likelihood (GML) decoder, and linear minimum mean square error (LMMSE) decoder, are investigated to reduce the required prior information at the receiver side, and their theoretical decoding performances are derived. Based on decoding performances and the required prior information for decoding, we discuss the preferred host domain and the preferred decoder for additive SS-based data hiding under different situations. Extensive simulations are conducted to illustrate the decoding performances of the presented decoders.
منابع مشابه
Steganalysis of additive-noise modelable information hiding
The process of information hiding is modeled in the context of additive noise. Under an independence assumption, the histogram of the stegomessage is a convolution of the noise probability mass function (PMF) and the original histogram. In the frequency domain this convolution is viewed as a multiplication of the histogram characteristic function (HCF) and the noise characteristic function. Lea...
متن کاملAN AUDIO SPREAD−SPECTRUM DATA HIDING SYSTEM WITH AN INFORMED EMBEDDING STRATEGY ADAPTED TO A WIENER FILTERING BASED RECEIVER (ThuAmOR3)
A particular application of audio data hiding systems and watermarking systems consists in using the audio signal as a transmission channel for binary information. The system should ensure a reliable and robust transmission for various channel perturbations but also propose a low computational cost for real−time applications. In this paper we present a hybrid spread−spectrum data hiding system,...
متن کاملPerformance Evaluation of Spread Spectrum Watermarking using Error Control Coding
This paper proposes an oblivious watermarking algorithm with blind detection approach for high volume data hiding in image signals. We present a detection reliable signal adaptive embedding scheme for multiple messages in selective sub-bands of wavelet (DWT) coefficients using direct sequence spread spectrum (DS-SS) modulation technique. Here the impact of volumetric distortion sources is analy...
متن کاملError exponents for one-bit watermarking
Quantization index modulation (QIM) is a powerful hostinterference rejecting method for data hiding. This paper applies QIM to one-bit watermarking and proposes a simple but powerful watermark detector. We derive lower bounds on the error exponents for the detector under a quadratic distortion constraint for the watermarker and additive white Gaussian noise attacks. These bounds are independent...
متن کاملSteganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions
In this paper , a steganalysis scheme based on multiple features formed by statistical moments of wavelet characteristic functions is proposed. Our theoretical analysis has pointed out that the defined n-th statistical moment of a wavelet characteristic function is related to the n-th derivative of the corresponding wavelet histogram, and hence is sensitive to data embedding. The selection of t...
متن کامل