Evolutionary hidden information detection by granulation-based fitness approximation

نویسندگان

  • Mohsen Davarynejad
  • C. W. Ahn
  • Jos L. M. Vrancken
  • Jan van den Berg
  • Carlos A. Coello Coello
چکیده

Spread spectrum audio watermarking (SSW) is one of the most powerful techniques for secure audio watermarking. SSW hides information by spreading the spectrum. The hidden information is called the ‘watermark’ and is added to a host signal, making the latter a watermarked signal. The spreading of the spectrum is carried out by using a pseudo-noise (PN) sequence. In conventional SSW approaches, the receiver must know both the PN sequence used at the transmitter and the location of the watermark in the watermarked signal for detecting the hidden information. This method has contributed much to secure audio watermarking in that any user, who is not able to access this secrete information, cannot detect the hidden information. Detection of the PN sequence is the key issue of hidden information detection in SSW. Although the PN sequence can be reliably detected by means of heuristic approaches, due to the high computational cost of this task, such approaches tend to be too computationally expensive to be practical. Evolutionary Algorithms (EAs) belong to a class of such approaches. Most of the computational complexity involved in the use of EAs arises from fitness function evaluation that may be either very difficult to define or computationally very expensive to evaluate. This paper proposes an approximate model, called Adaptive Fuzzy Fitness Granulation with Fuzzy Supervisor (AFFG-FS), to replace the expensive fitness function evaluation. First, an intelligent guided technique via an adaptive fuzzy similarity analysis for fitness granulation is used for deciding on the use of exact fitness function and dynamically adapting the predicted model. Next, in order to avoid manually tuning parameters, a fuzzy supervisor as auto-tuning algorithm is employed. Its effectiveness is investigated with three traditional optimization benchmarks of four different choices for the dimensionality of the search space. The effect of the number of granules on the rate of convergence is also studied. The proposed method is then extended to the hidden information detection problem to recover a PN sequence with a chip period equal to 63, 127 and 255 bits. In comparison with the standard application of EAs, experimental analysis confirms that the proposed approach has an ability to considerably Mohsen Davarynejad is Ph.D. researcher with the Faculty of System Engineering, Policy analysis and Management, Delft University of Technology, 2600GA, Delft, The Netherlands. (email: [email protected]). Chang Wook Ahn is with the School of Information and Communication Engineering, Sungkyunkwan University, Korea. (email: [email protected]). Jos Vrancken is Associate Professor with the Faculty of System Engineering, Policy analysis and Management, Delft University of Technology, 2600GA, Delft, The Netherlands. (email: [email protected]). Jan van den Berg is Associate Professor with the Faculty of System Engineering, Policy analysis and Management, Delft University of Technology, 2600GA, Delft, The Netherlands. (email: [email protected]). Carlos A. Coello Coello is with CINVESTAV-IPN (Evolutionary Computation Group), Departmento de Computacion, Av. IPN No. 2508, Col. San Pedro Zacatanco, Mexico D.F. 07300, Mexico. (email: [email protected]). Evolutionary Hidden Information Detection by Granulation-Based Fitness Approximation M. Davarynejad, C. W. Ahn, J. Vrancken, J. van den Berg, C. A. Coello Coello reduce the computational complexity of the detection problem without compromising performance. Furthermore, the auto-tuning of the fuzzy supervisor removes the need of exact parameter determination.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection Using Evolutionary Hidden Markov Model

Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training,  ...

متن کامل

STRUCTURAL DAMAGE DETECTION BY MODEL UPDATING METHOD BASED ON CASCADE FEED-FORWARD NEURAL NETWORK AS AN EFFICIENT APPROXIMATION MECHANISM

Vibration based techniques of structural damage detection using model updating method, are computationally expensive for large-scale structures. In this study, after locating precisely the eventual damage of a structure using modal strain energy based index (MSEBI), To efficiently reduce the computational cost of model updating during the optimization process of damage severity detection, the M...

متن کامل

Verification of an Evolutionary-based Wavelet Neural Network Model for Nonlinear Function Approximation

Nonlinear function approximation is one of the most important tasks in system analysis and identification. Several models have been presented to achieve an accurate approximation on nonlinear mathematics functions. However, the majority of the models are specific to certain problems and systems. In this paper, an evolutionary-based wavelet neural network model is proposed for structure definiti...

متن کامل

Uncertainty analysis of hierarchical granular structures for multi-granulation typical hesitant fuzzy approximation space

Hierarchical structures and uncertainty measures are two main aspects in granular computing, approximate reasoning and cognitive process. Typical hesitant fuzzy sets, as a prime extension of fuzzy sets, are more flexible to reflect the hesitance and ambiguity in knowledge representation and decision making. In this paper, we mainly investigate the hierarchical structures and uncertainty measure...

متن کامل

Case study of inaccuracies in the granulation of decision trees

Cybernetics studies information process in the context of interaction with physical systems. Because such information is sometimes vague and exhibits complex interactions; it can only be discerned using approximate representations. Machine learning provides solutions that create approximate models of information and decision trees are one of its main components. However, decision trees are susc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Appl. Soft Comput.

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2010