E-capacity analysis of data-hiding channels with geometrical attacks

نویسندگان

  • Emre Topak
  • Sviatoslav Voloshynovskiy
  • Oleksiy J. Koval
  • Mariam E. Haroutunian
  • José-Emilio Vila-Forcén
  • Thierry Pun
چکیده

In a data hiding communications scenario, geometrical attacks lead to a loss of reliable communications due to synchronization problems when the applied attack is unknown. In our previous work, information-theoretic analysis of this problem was performed for theoretic setups, i.e., when the length of communicated data sequences asymptotically approaches infinity. Assuming that the applied geometrical attack belongs to a set of finite cardinality, it is demonstrated that it does not asymptotically affect the achievable rate in comparison to the scenario without any attack. The main goal of this paper is to investigate the upper and lower bounds on the rate reliability function that can be achieved in the data hiding channel with some geometrical state. In particular, we investigate the random coding and sphere packing bounds in channels with random parameter for the case when the interference (channel state) is not taken into account at the encoder. Furthermore, only those geometrical transformations that preserve the input dimensionality and input type class are considered. For this case we are showing that similar [...] TOPAK, Emre, et al. E-capacity analysis of data-hiding channels with geometrical attacks. In: Proceedings of SPIE Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

Data Hiding Method Based on Graph Coloring and Pixel Block‘s Correlation in Color Image

An optimized method for data hiding into a digital color image in spatial domainis provided. The graph coloring theory with different color numbers is applied. To enhance thesecurity of this method, block correlations method in an image is used. Experimental results showthat with the same PSNR, the capacity is improved by %8, and also security has increased in themethod compared with other meth...

متن کامل

On Security of Geometrically-robust Data-hiding

In this paper we analyze security of robust data-hiding in channels with geometrical transformations. We categorize possible decoding strategies for channels with geometrical transformations within the information-theoretic framework for geometrically-robust datahiding. Furthermore, considering template-based and redundantbased design of geometrically robust data-hiding systems, we provide the ...

متن کامل

Data hiding capacity in the presence of an imperfectly known channel

We consider a data hiding channel in this paper that is not perfectly known by the encoder and the decoder. The imperfect knowledge could be due to the channel estimation error, time-varying active adversary etc. A mathematical model for this scenario is proposed. Many important attacks such as scaling, geometrical transformations etc. fall under the proposed mathematical model. Minimal assumpt...

متن کامل

Steganographic capacity estimation for the statistical restoration framework

In this paper we attempt to quantify the “active” steganographic capacity the maximum rate at which data can be hidden, and correctly decoded, in a multimedia cover subject to noise/attack (hence active), perceptual distortion criteria, and statistical steganalysis. Though work has been done in studying the capacity of data hiding as well as the rate of perfectly secure data hiding in noiseless...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006