Professional Documents
Culture Documents
Digital Invisible Ink and Its Applications in Steganography: January 2006
Digital Invisible Ink and Its Applications in Steganography: January 2006
Digital Invisible Ink and Its Applications in Steganography: January 2006
net/publication/220942174
CITATIONS READS
5 562
3 authors:
22 PUBLICATIONS 336 CITATIONS
National Taiwan University
9 PUBLICATIONS 114 CITATIONS
SEE PROFILE
SEE PROFILE
Ja-Ling Wu
National Taiwan University
280 PUBLICATIONS 3,900 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Audio Musical Dice Game: A User-Preference-Aware Medley Generating System View project
All content following this page was uploaded by Chun-Hsiang Huang on 10 June 2015.
correctly or clearly revealed unless certain pre-negotiated Cover Message Genuine Message
Cover Message
Genuine Message
(Together with Cover Message)
Spread-Spectrum Schemes
w T w T
Spread-spectrum watermarking techniques, e.g. those introduced
in [6, 7], are correlation-based schemes. The process of (a) (b)
embedding one payload bit using spread-spectrum schemes can be Figure 2. Geometric models of spread-spectrum
formulated as: watermarking: (a) the general case and (b) the informed-
cwn=co+n+a‧b‧w (1) embedding case
In a DII data-hiding scheme, the most essential principle is that
where co is the original cover work, cwn is the distorted and
the existence of a noise k caused by certain pre-negotiated
marked work, n is the additive noise caused by malicious attacks
manipulations is necessary for the successful detection of the
or media processing. b is the payload bit represented as 1 or -1, a
payload bit, as illustrated in Figure 3. In Figure 3(a), a detection
is the weighting factor deciding the embedding energy of
result of b=1 is guaranteed by employing informed-embedding
watermark signals (which can be determined according to
approach similar to Eqn. (2). The only difference is that, now, the
perceptual models or specific embedding rules), and w is the
effect of k is considered instead of n. If k is not applied to the
predefined watermark vector (often a pseudo-random chip
marked content, as the case shown in Figure 3(b), a different
sequence in common spread-spectrum schemes).
embedding result (b=-1) will be obtained.
In order to identify whether the suspected work cs has been
When performing general spread-spectrum watermark embedding
marked, the correlation value between cs and w is calculated. If
and detection, the desired situation illustrated in Figure 3 does not
the correlation value is larger than a positive threshold value T, cs
always occur. According to the aforementioned geometric model,
can be regarded as hidden with a payload bit of 1 (i.e., b=1). On
some requirements must be satisfied. First, the angle between the
the contrary, if the correlation value is less than a negative
noise k and the watermark vector w must be within the range of
threshold value –T, it means that cs is carrying a payload bit of -1.
[90o, -90o]. In other words, the noise vector k must contribute
Figure 2(a) shows the geometric model illustrating the prescribed positively to the extraction result. Furthermore, the magnitude
embedding/detection processes. cwn, co, n and w are often that the vector k projects on the direction of w, denoted as E in
regarded as vectors in a multi-dimensional hyperspace. With Figure 3(a), must be larger than the guaranteed amount D over the
adequately normalized w, the obtained correlation value is in fact detection threshold T. That is, k must contribute significantly to
the projection of cs in the direction of w. the detection result. If the two requirements are not satisfied, the
DII data hiding scheme “fails” (i.e. the extracted payload bit is the
In an informed-embedding case, i.e. assume the effects of the same no matter whether the pre-negotiated manipulations are
cover work co and n are known, the weighting factor a can be applied to the marked work or not).
adjusted to guarantee a successful detection such that:
aw
w‧co+w‧n+a‧w2 > T+D (2) k
aw
E x t r a c t i o n S im i la r i t y
E x t r a c t io n S im ila r it y
E x t r a c t io n S im ila r it y
7. REFERENCES
Q=10 Q=20 Q=30 Q=35 Q=40
[1] Bauer, F. L. Decrypted Secrets: Methods and Maxims of
Cryptology, 2nd Edition, Chapter 1, Springer, 2000
[2] Rigden, D. SOE Syllabus: Lessons in Ungentlemanly
Warfare, World War II, Gardeners Books, 2004
Q=50 Q=60 Q=70 Q=80 Q=90