2012
DOI: 10.1186/1687-6180-2012-88
|View full text |Cite
|
Sign up to set email alerts
|

Efficient blind decoders for additive spread spectrum embedding based data hiding

Abstract: This article investigates efficient blind watermark decoding approaches for hidden messages embedded into host images, within the framework of additive spread spectrum (SS) embedding based for data hiding. We study SS embedding in both the discrete cosine transform and the discrete Fourier transform (DFT) domains. The contributions of this article are multiple-fold: first, we show that the conventional SS scheme could not be applied directly into the magnitudes of the DFT, and thus we present a modified SS sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…The key signal s=false[s1,s2,,sN].1emT is a pseudorandom binary sequence where s i ∈ {− 1, 1}, and, finally, α represents the embedding strength. To improve the performance and have a host‐rejection approach at the receiver side which decreases the error probability, the improved spread spectrum (ISS) method can be used as follows [13]y=x+αdskssTx where k is derived by minimising the probability of error. The distortion for this structure could be computed asD=1NnormalE||||sαdkssTx2=α2+k2bold-italicsnormalTRbold-italicxbold-italics where R x is the autocorrelation matrix of the host signal.…”
Section: Spread Spectrum Data Embeddingmentioning
confidence: 99%
See 2 more Smart Citations
“…The key signal s=false[s1,s2,,sN].1emT is a pseudorandom binary sequence where s i ∈ {− 1, 1}, and, finally, α represents the embedding strength. To improve the performance and have a host‐rejection approach at the receiver side which decreases the error probability, the improved spread spectrum (ISS) method can be used as follows [13]y=x+αdskssTx where k is derived by minimising the probability of error. The distortion for this structure could be computed asD=1NnormalE||||sαdkssTx2=α2+k2bold-italicsnormalTRbold-italicxbold-italics where R x is the autocorrelation matrix of the host signal.…”
Section: Spread Spectrum Data Embeddingmentioning
confidence: 99%
“…In doing so, two simple suboptimum detectors based on LOD and GML are proposed. Noting that due to imperceptibly concerns the value of embedding strength is small, the LOD decoder could be derived by using the first order Taylor expansion of z ML ( α ) around zero [13]znormalLOD=|znormalMLα=0+|normal∂znormalMLnormal∂αα=0α+ Discarding the higher order terms and carrying out some straight forward mathematical operations, we haveznormalLOD=2θασbold-italicxθfalse∑i=1Nbold-italicpibold-italicsbold-italicpibold-italicyθ1normalsgn(bold-italicpibold-italicy) The derived LOD detector is independent of α , but it still requires the value of θ . Thus, in this suboptimal decoder, the shape parameter should be known or estimated at the receiver side.…”
Section: Spread Spectrum Data Embeddingmentioning
confidence: 99%
See 1 more Smart Citation