Modulation and Information Hiding in
نویسنده
چکیده
We use concepts from communication theory to characterize information hiding schemes: the amount of information that can be hidden, its perceptibility, and its robustness to removal can be modeled using the quantities channel capacity, signal-to-noise ratio, and jamming margin. We then introduce new information hiding schemes whose parameters can easily be adjusted to trade oo capacity, imperceptibility, and robustness as required in the application. The theory indicates the most aggressive feasible parameter settings. We also introduce a technique called predistortion for increasing resistance to JPEG compression. Analogous tactics are presumably possible whenever a model of anticipated distortion is available.
منابع مشابه
A survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملInformation-Theoretic Analysis of Security in Side-Informed Data Hiding
In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify the information about the secret key that leaks from the observation of watermarked signals, using the mutual information as analytic tool for providing a fair comparison between the original Costa’s scheme, Distortion Compensated ...
متن کاملID Modulation: Embedding Sensor Data in an RFID Timeseries
This paper reports the first use of ID Modulation to embed a bitstream representing sensor information in a standards-compliant Radio Frequency Identification (RFID) channel. Like other forms of information hiding, ID Modulation embeds a new, lower bit-rate channel in a pre-existing host channel, without requiring any changes to the protocols defining the host channel. Like most other forms of ...
متن کاملModulation and Information Hiding in Images
We use concepts from communication theory to characterize information hiding schemes: the amount of information that can be hidden, its perceptibility, and its robustness to removal can be modeled using the quantities channel capacity, signal-to-noise ratio, and jamming margin. We then introduce new information hiding schemes whose parameters can easily be adjusted to trade o capacity, impercep...
متن کاملLinear and Nonlinear Oblivious Data Hiding
The majority of the existing data hiding schemes are based on the direct-sequence (DS) modulation where a low-power random sequence is embedded into the original cover signal to represent hidden information. In this paper, we investigate linear and nonlinear modulation approaches in digital data hiding. One typical DS modulation algorithm is explored and its optimal oblivious detector is derive...
متن کاملSecured Data Hiding based on Compression Function and Quantization
Data hiding is the process of secretly embedding information inside a data source without changing its perceptual quality. In this paper, Quantization Index Modulation and the compression function of μ-Law standards for quantization are used. The proposed method transforms the host signal into the logarithmic domain using the μ-Law compression function. Then, the transformed data is quantized u...
متن کامل