Linear and Nonlinear Oblivious Data Hiding

نویسندگان

  • Litao Gang
  • Ali N. Akansu
  • Mahalingam Ramkumar
چکیده

The majority of the existing data hiding schemes are based on the direct-sequence (DS) modulation where a low-power random sequence is embedded into the original cover signal to represent hidden information. In this paper, we investigate linear and nonlinear modulation approaches in digital data hiding. One typical DS modulation algorithm is explored and its optimal oblivious detector is derived. The results expose its poor cover noise suppression as the hiding signature signal always has much lower energy than the cover signal. A simple nonlinear algorithm, called set partitioning, is proposed and its performance is analyzed. Analysis and simulation studies further demonstrate improvements over the existing schemes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Robust Scheme for Oblivious Detection of Watermarks / Data Hiding in Still Images

We propose a novel, robust scheme for data hiding/ oblivious detection of watermarks in still images. While the low-frequency image coe cients are robust, they cannot be used e ectively for oblivious detection methods, when correlative processing is employed for detection. However, in the proposed non-linear detection method, the robust low-frequency bands can be used e ectively. Thus the propo...

متن کامل

MP3 resistant oblivious steganography

Robustness to compression is a basic requirement for any data hiding scheme. In this paper, we concentrate on MP3 resistant oblivious data hiding. First the MP3 compression algorithm is brie y introduced. In the second half, we propose three e ective data hiding schemes, where the message is embedded in amplitude, DFT phase domain, and noisy components, respectively. All these schemes demonstra...

متن کامل

Private Revocation Test using Oblivious Membership Evaluation Protocol

This paper presents a cryptographic protocol for the authenticated dictionary, namely, an untrusted directory provides a verifiable answer to a membership query for a given element. In our protocol, a user is able to retrieve whether or not a target element belongs to a database that the directory has without revealing which element he/she wishes to know against the untrusted directory. Our pro...

متن کامل

Some Results on Nonlinear Zigzag Functions

Zigzag functions were deened by Brassard, Cr epeau and SS antha 1] in connection with an application to the construction of oblivious transfers (a useful tool in cryptographic protocols). They proved that linear zigzag functions are equivalent to self-intersecting codes, which have been studied by several researchers. In this paper, we begin an investigation of general (linear or non-linear) zi...

متن کامل

Oblivious RAM Revisited

We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a client, that can store locally only a constant amount of data, to store remotely n data items, and access them while hiding the identities of the items which are being accessed. Oblivious RAM is often cited as a powerful tool, which can be used, for example, for search on encrypted data or for prev...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • EURASIP J. Adv. Sig. Proc.

دوره 2004  شماره 

صفحات  -

تاریخ انتشار 2004