Scalar costa scheme for information embedding

被引:257
|
作者
Eggers, JJ [1 ]
Bäuml, R [1 ]
Tzschoppe, R [1 ]
Girod, B [1 ]
机构
[1] Univ Erlangen Nurnberg, Lehrstuhl Nachrichtentech, Erlangen, Germany
关键词
blind digital watermarking; communication with side-information; information embedding; scalar Costa scheme;
D O I
10.1109/TSP.2003.809366
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Research on information embedding, particularly information hiding techniques, has received considerable attention within the last years due to its potential application in multimedia security. Digital watermarking, which is an information hiding technique where the embedded information is robust against malicious or accidental attacks, might offer new possibilities to enforce the copyrights of multimedia data. In this paper, the specific case of information embedding into independent identically distributed (IID) data and attacks by additive white Gaussian noise (AWGN) is considered. The original data is not available to the decoder. For Gaussian data, in 1983, Costa proposed a scheme that theoretically achieves the capacity of this communication scenario. However, Costa's scheme is not practical. Thus, several research groups have proposed suboptimal practical communication schemes based on Costa's idea. The goal of this paper is to give a complete performance analysis of the scalar Costa scheme (SCS), which is a suboptimal technique using scalar embedding and reception functions. Information theoretic bounds and simulation results with state-of-the-art coding techniques are compared. Further, reception after amplitude scaling attacks and, the invertibility of SCS embedding are investigated.
引用
收藏
页码:1003 / 1019
页数:17
相关论文
共 50 条
  • [1] Scalar scheme for multiple user information embedding
    Zaidi, A
    Piantanida, P
    Duhamel, P
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 5 - 8
  • [2] Revealing the true achievable rates of Scalar Costa Scheme
    Pérez-Freire, L
    Pérez-González, F
    Voloshynovskiy, S
    [J]. 2004 IEEE 6TH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2004, : 203 - 206
  • [3] An efficient low bit-rate information embedding costa based scheme using a perceptual model
    Delpha, Claude
    Touko, Brice Djeumou
    Zaidi, Abdellatif
    Duhamel, Pierre
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 189 - +
  • [4] On the efficiency of embedding information within scalar quantizers
    Davies, Mike
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (02) : 853 - 859
  • [5] Improved scalar Costa scheme based on Watson perceptual model
    Qi K.-Y.
    Chen J.-B.
    Zhou Y.
    [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 (1) : 26 - 29
  • [6] An Improved Scalar Costa Scheme Based on Watson Perceptual Model
    齐开悦
    陈剑波
    周异
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, (01) : 26 - 29
  • [7] The Scalar Scheme for Reversible Information-Embedding in Gray-Scale Signals: Capacity Evaluation and Code Constructions
    Lin, Sian-Jheng
    Chung, Wei-Ho
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) : 1155 - 1167
  • [8] Improved Performances of Scalar Costa Scheme for Images Watermarking in an Independent Domain
    Mostefa, I. Benkara
    Delpha, C.
    Braci, S.
    Boyer, R.
    Khamadja, M.
    [J]. 2009 PROCEEDINGS OF 6TH INTERNATIONAL SYMPOSIUM ON IMAGE AND SIGNAL PROCESSING AND ANALYSIS (ISPA 2009), 2009, : 477 - +
  • [9] Additive non-gaussian noise attacks on the scalar Costa scheme (SCS)
    Tzschoppe, R
    Bäuml, R
    Fischer, R
    Huber, J
    Kaup, A
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VII, 2005, 5681 : 114 - 123
  • [10] Complete Double Layered Embedding Scheme for Information Hiding
    Lee, Chin-Feng
    Shen, Jau-Ji
    Chao, Hung-Lin
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 525 - +