Paper
16 February 2006 E-capacity analysis of data-hiding channels with geometrical attacks
E. Topak, S. Voloshynovskiy, O. Koval, M. E. Haroutunian, J. E. Vila-Forcén, T. Pun
Author Affiliations +
Proceedings Volume 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII; 607213 (2006) https://doi.org/10.1117/12.642117
Event: Electronic Imaging 2006, 2006, San Jose, California, United States
Abstract
In a data hiding communications scenario, geometrical attacks lead to a loss of reliable communications due to synchronization problems when the applied attack is unknown. In our previous work, information-theoretic analysis of this problem was performed for theoretic setups, i.e., when the length of communicated data sequences asymptotically approaches infinity. Assuming that the applied geometrical attack belongs to a set of finite cardinality, it is demonstrated that it does not asymptotically affect the achievable rate in comparison to the scenario without any attack. The main goal of this paper is to investigate the upper and lower bounds on the rate reliability function that can be achieved in the data hiding channel with some geometrical state. In particular, we investigate the random coding and sphere packing bounds in channels with random parameter for the case when the interference (channel state) is not taken into account at the encoder. Furthermore, only those geometrical transformations that preserve the input dimensionality and input type class are considered. For this case we are showing that similar conclusion obtained in the asymptotic case is valid, meaning that within the class of considered geometrical attacks the rate reliability function is bounded in the same way as in the case with no geometrical distortions.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
E. Topak, S. Voloshynovskiy, O. Koval, M. E. Haroutunian, J. E. Vila-Forcén, and T. Pun "E-capacity analysis of data-hiding channels with geometrical attacks", Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 607213 (16 February 2006); https://doi.org/10.1117/12.642117
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data hiding

Data communications

Computer programming

Optical spheres

Reliability

Analytical research

Digital watermarking

RELATED CONTENT

The syntax of concealment reliable methods for plain text...
Proceedings of SPIE (February 27 2007)
Watermarking in JPEG bitstream
Proceedings of SPIE (March 21 2005)
Attacking digital watermarks
Proceedings of SPIE (June 22 2004)
TCQ-based quantizer design for data hiding in images
Proceedings of SPIE (March 21 2005)

Back to Top