Scalar costa scheme for information embedding

被引:257
|
作者
Eggers, JJ [1 ]
Bäuml, R [1 ]
Tzschoppe, R [1 ]
Girod, B [1 ]
机构
[1] Univ Erlangen Nurnberg, Lehrstuhl Nachrichtentech, Erlangen, Germany
关键词
blind digital watermarking; communication with side-information; information embedding; scalar Costa scheme;
D O I
10.1109/TSP.2003.809366
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Research on information embedding, particularly information hiding techniques, has received considerable attention within the last years due to its potential application in multimedia security. Digital watermarking, which is an information hiding technique where the embedded information is robust against malicious or accidental attacks, might offer new possibilities to enforce the copyrights of multimedia data. In this paper, the specific case of information embedding into independent identically distributed (IID) data and attacks by additive white Gaussian noise (AWGN) is considered. The original data is not available to the decoder. For Gaussian data, in 1983, Costa proposed a scheme that theoretically achieves the capacity of this communication scenario. However, Costa's scheme is not practical. Thus, several research groups have proposed suboptimal practical communication schemes based on Costa's idea. The goal of this paper is to give a complete performance analysis of the scalar Costa scheme (SCS), which is a suboptimal technique using scalar embedding and reception functions. Information theoretic bounds and simulation results with state-of-the-art coding techniques are compared. Further, reception after amplitude scaling attacks and, the invertibility of SCS embedding are investigated.
引用
收藏
页码:1003 / 1019
页数:17
相关论文
共 50 条
  • [41] Information Embedding With Reversible Stegotext
    Sumszyk, Orna
    Steinberg, Yossef
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 2728 - 2732
  • [42] Concept Embedding for Information Retrieval
    Abdulahhad, Karam
    [J]. ADVANCES IN INFORMATION RETRIEVAL (ECIR 2018), 2018, 10772 : 563 - 569
  • [43] Network Embedding with Centrality Information
    Ma, Yao
    Wang, Suhang
    Tang, Jiliang
    [J]. 2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, : 1144 - 1145
  • [44] Embedding hypermedia into information systems
    Oinas-Kukkonen, H
    [J]. THIRTIETH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, VOL 6: DIGITAL DOCUMENTS, 1997, : 187 - 196
  • [45] Embedding Covert Information Flow
    Marano, Stefano
    Matta, Vincenzo
    Tong, Lang
    [J]. 2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR), 2010, : 52 - 56
  • [46] Information Leakage in Embedding Models
    Song, Congzheng
    Raghunathan, Ananth
    [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 377 - 390
  • [47] Embedding Meta Information into Visualizations
    Hota, Alok
    Huang, Jian
    [J]. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2020, 26 (11) : 3189 - 3203
  • [48] Embedding information security into the organization
    Johnson, M. Eric
    Goetz, Eric
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (03) : 16 - 24
  • [49] Information Embedding With Stegotext Reconstruction
    Xu, Yinfei
    Lu, Jian
    Guang, Xuan
    Xu, Wei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1415 - 1428
  • [50] INFORMATION EMBEDDING WITH REVERSIBLE STEGOTEXT
    Sumszyk, Orna
    Steinberg, Yossef
    [J]. 2008 IEEE 25TH CONVENTION OF ELECTRICAL AND ELECTRONICS ENGINEERS IN ISRAEL, VOLS 1 AND 2, 2008, : 394 - 395