By Topic

An accurate analysis of scalar quantization-based data hiding

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
L. Perez-Freire ; Dept. of Comput. Sci., Univ. of Geneva, Geneve, Switzerland ; F. Perez-Gonzalez ; S. Voloshynovskiy

This paper comes to fill a gap in watermarking theory, analyzing the exact performance of the scalar Costa scheme (SCS) facing additive Gaussian attacks when the usual approximation of high-resolution quantization is not valid, thus taking into account the host statistics. The analysis is focused on the assessment of the probability of error, showing new results, an although it is valid in a general scenario, its practical interest is increased when SCS is used in conjunction with the so-called spread-transform. The accomplished reformulation of the problem also permits to show that the achievable rate of SCS is never worse than that of classical spread-spectrum-based methods, as it was thought so far, and allows to establish interesting links with spread spectrum and the Improved Spread Spectrum method.

Published in:

IEEE Transactions on Information Forensics and Security  (Volume:1 ,  Issue: 1 )