Amplitude-adaptive spread-spectrum data embedding

In this study, the authors consider additive spread-spectrum (SS) data embedding in transform-domain host data. Conventional additive SS embedding schemes use an equal-amplitude modulated carrier to deposit one information symbol across a group of host data coefficients which act as interference to SS signal of interest. If there is a flexibility of assigning different amplitudes across symbol bits, the probability of error can be further reduced by adaptively allocating amplitude to each symbol bit based on its own host/interference. In this study, they present a novel amplitude-adaptive SS embedding scheme. Particularly, symbol-by-symbol adaptive amplitude allocation algorithms are developed to compensate for the impact from the known interference. They aim at designing the SS embedding amplitude for each symbol adaptively in order to minimise the receiver bit-error-rate (BER) at any given distortion level. Then, optimised amplitude allocation for multi-carrier/multi-message embedding in the same host data is studied as well. Finally, they consider the problem of amplitude optimisation for an ideal scenario where no external noise is introduced during embedding and transmission. Extensive experimental results illustrate that the proposed amplitude-adaptive SS embedding scheme can provide order-of-magnitude performance improvement over several other state-of-the-art SS embedding schemes.

[1]  Min Wu,et al.  Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.

[2]  KokSheik Wong,et al.  An Overview of Information Hiding in H.264/AVC Compressed Video , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Dimitris A. Pados,et al.  SINR, bit error rate, and Shannon capacity optimized spread-spectrum steganography , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[4]  Hamid Reza Tohidypour,et al.  Robust quantisation index modulation-based approach for image watermarking , 2013, IET Image Process..

[5]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[6]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[7]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[8]  Yiyan Wu,et al.  A New Approach for Optimal Multiple Watermarks Injection , 2011, IEEE Signal Processing Letters.

[9]  Ming Li,et al.  Extracting Spread-Spectrum Hidden Data From Digital Media , 2013, IEEE Transactions on Information Forensics and Security.

[10]  Di Xiao,et al.  Separable data hiding in encrypted image based on compressive sensing , 2014 .

[11]  Rui Li,et al.  A digital watermarking approach to secure and precise range query processing in sensor networks , 2013, 2013 Proceedings IEEE INFOCOM.

[12]  Sen Bai,et al.  Steganography Integration Into a Low-Bit Rate Speech Codec , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Alex ChiChung Kot,et al.  On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding , 2013, IEEE Transactions on Information Forensics and Security.

[14]  Wen-Hsiang Tsai,et al.  Line-Based Cubism-Like Image—A New Type of Art Image and its Application to Lossless Data Hiding , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Wei Lu,et al.  Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture , 2015, IEEE Transactions on Information Forensics and Security.

[16]  T. Geetamma,et al.  An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain , 2014 .

[17]  Thomas S. Huang,et al.  An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..

[18]  Z. Jane Wang,et al.  An Improved Multiplicative Spread Spectrum Embedding Scheme for Data Hiding , 2012, IEEE Transactions on Information Forensics and Security.

[19]  Z. Jane Wang,et al.  A Framework of Multiplicative Spread Spectrum Embedding for Data Hiding: Performance, Decoder and Signature Design , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[20]  Mauro Barni,et al.  Capacity of full frame DCT image watermarks , 2000, IEEE Trans. Image Process..

[21]  Mauro Barni,et al.  Optimum decoding and detection of multiplicative watermarks , 2003, IEEE Trans. Signal Process..

[22]  Joseph W. Goodman,et al.  A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..

[23]  Yao Zhao,et al.  LDFT-Based Watermarking Resilient to Local Desynchronization Attacks , 2013, IEEE Transactions on Cybernetics.

[24]  Hsien-Wen Tseng,et al.  High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion , 2014, IET Image Process..

[25]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[26]  Ying Wang,et al.  Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions , 2007, IEEE Transactions on Information Theory.

[27]  Deepa Kundur,et al.  Analysis and design of watermarking algorithms for improved resistance to compression , 2004, IEEE Transactions on Image Processing.

[28]  Mauro Barni,et al.  A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..

[29]  Dimitris A. Pados,et al.  Optimal Signature Design for Spread-Spectrum Steganography , 2007, IEEE Transactions on Image Processing.

[30]  Pierre Moulin,et al.  Design and statistical analysis of a hash-aided image watermarking system , 2004, IEEE Transactions on Image Processing.

[31]  Tianqing Zhu,et al.  Correlated Differential Privacy: Hiding Information in Non-IID Data Set , 2015, IEEE Transactions on Information Forensics and Security.

[32]  Cheng Yang,et al.  A Survey of JND Models in Digital Image Watermarking , 2013 .

[33]  Z. Jane Wang,et al.  Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding , 2011, IEEE Transactions on Information Forensics and Security.

[34]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[35]  Pierre Moulin,et al.  The zero-rate spread-spectrum watermarking game , 2003, IEEE Trans. Signal Process..

[36]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..