Information Embedding With Stegotext Reconstruction

被引:0
|
作者
Xu, Yinfei [1 ]
Lu, Jian [1 ]
Guang, Xuan [2 ,3 ]
Xu, Wei [4 ,5 ]
机构
[1] Southeast Univ, Sch Informat Sci & Engn, Nanjing 210096, Peoples R China
[2] Nankai Univ, Sch Math Sci, Tianjin 300071, Peoples R China
[3] Nankai Univ, Key Lab Pure Math & Combinator LPMC, Tianjin 300071, Peoples R China
[4] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[5] Purple Mt Labs, Nanjing 211111, Peoples R China
基金
中国国家自然科学基金;
关键词
Capacity-distortion function; channel with state; dirty paper coding; Gel'fand-Pinsker problem; information embedding; steganography; stegotext reconstruction; watermarking; STEGANOGRAPHY; CAPACITY; CHANNEL;
D O I
10.1109/TIFS.2023.3337947
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we consider stegotext reconstruction problem in information embedding. By adding the requirement of restoring the stegotext under certain fidelity criterion, we generalize the concept of reversible/irreversible information embedding. We focus on the stegotext reconstruction in a discrete memoryless host dependent attack channel, which can be regarded as a generalized Gel'fand-Pinsker problem with an input reconstruction constraint. For this problem, we prove an upper bound and a lower bound on its embedding capacity-distortion function, which is defined to describe the tradeoff between embedding information rate, host composition loss, and stegotext reconstruction distortion. In particular, our upper and lower bounds thus obtained match each other for the binary XOR attack channel with Hamming distortion and Costa's additive Gaussian attack channel with quadratic loss. We further consider a variant of this problem, where host signal is available at the encoder in a causal way. For this case, we completely characterize its capacity-distortion function.
引用
下载
收藏
页码:1415 / 1428
页数:14
相关论文
共 50 条
  • [31] Embedding information in Chinese calligraphy images
    Wang, Zhi-Hui
    Chang, Chin-Chen
    Huang, Ying-Hsuan
    Yang, Hai-Rui
    Horng, Gwoboa
    Journal of Computers (Taiwan), 2015, 26 (02) : 11 - 18
  • [32] On joint information embedding and lossy compression
    Maor, A
    Merhav, N
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (08) : 2998 - 3008
  • [33] Embedding Imputation with Grounded Language Information
    Yang, Ziyi
    Zhu, Chenguang
    Sachidananda, Vin
    Darve, Eric
    57TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2019), 2019, : 3356 - 3361
  • [34] Information preserving XML schema embedding
    Fan, Wenfei
    Bohannon, Philip
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 2008, 33 (01):
  • [35] NavWalker: Information Augmented Network Embedding
    Lai, Kwei-Herng
    Chen, Chih-Ming
    Tsai, Ming-Feng
    Wang, Chuan-Ju
    2018 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2018), 2018, : 9 - 16
  • [36] Hiding Information Employing Reduplicating Embedding
    Lee, Chin-Feng
    Chuang, Lin-Yi
    Chang, Chin-Chen
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 825 - +
  • [37] WAVELET DOMAIN VIDEO INFORMATION EMBEDDING
    Yang, Ming
    Trifas, Monica
    Truitt, Candice
    Xiong, Guolun
    WMSCI 2008: 12TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS, 2008, : 213 - +
  • [38] FINE: Fisher Information Nonparametric Embedding
    Carter, Kevin M.
    Raich, Raviv
    Finn, William G.
    Hero, Alfred O., III
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2009, 31 (11) : 2093 - U195
  • [39] Embedding innovation for scholarly information and research
    Sparks, JoAnne
    O'Brien, Linda
    Richardson, Joanna
    Wolski, Malcolm
    Tadic, Sanja
    Morris, Joanne
    LIBRARY MANAGEMENT, 2013, 34 (1-2) : 128 - 140
  • [40] Embedding Covert Information in Broadcast Communications
    Arumugam, Keerthi Suria Kumar
    Bloch, Mathieu R.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (10) : 2787 - 2801