By Topic

Intelligent Information Hiding and Multimedia Signal Processing, 2006. IIH-MSP '06. International Conference on

Date 18-20 Dec. 2006

Filter Results

Displaying Results 1 - 25 of 173
  • 2006 International Conference on Intelligent Information Hiding and Multimedia - Cover

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (59 KB)  
    Freely Available from IEEE
  • 2006 International Conference on Intelligent Information Hiding and Multimedia - Title page

    Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (50 KB)  
    Freely Available from IEEE
  • 2006 International Conference on Intelligent Information Hiding and Multimedia - Copyright notice

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (44 KB)  
    Freely Available from IEEE
  • 2006 International Conference on Intelligent Information Hiding and Multimedia -TOC

    Page(s): v - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (77 KB)  
    Freely Available from IEEE
  • Preface

    Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (40 KB)  
    Freely Available from IEEE
  • Organizing Committee

    Page(s): xvi - xxii
    Save to Project icon | Request Permissions | PDF file iconPDF (56 KB)  
    Freely Available from IEEE
  • Spread Spectrum Audio Steganography Using Sub-band Phase Shifting

    Page(s): 3 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (163 KB) |  | HTML iconHTML  

    This paper presents an improvement of spread spectrum audio data hiding methods. We introduce phase shifting in audio signals to reduce the correlation with PN signal per each sub-band. It allows easy detection of the embedded data signal from audio when de-spreading the compound signal. The paper reports the subjective test results and the measurements of noise resiliency. The proposed method generates the quality degradation at the same level of NMR +3dB, but accests +6dB noise, therefore, the method has 3dB benefits. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Hiding in Speech Sounds Using Subband Amplitude Modulation Robust against Reverberations and Background Noise

    Page(s): 7 - 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (194 KB) |  | HTML iconHTML  

    Data hiding in audio signals can be used for transmitting auxiliary information related to the content of the audio signal. Such an application requires a greater data payload than music copyright management systems. Also, it is difficult to extract the embedded data from sounds played through a loudspeaker and detected by a microphone because of additive background noise, reflections and reverberations and the band-limited characteristics of loudspeakers and microphones. In this study, a watermarking technique using subband amplitude modulation was evaluated by computer simulation in terms of robustness against background noises and reverberations. The effects of amplitude modulation on the articulation scores of 125 vowel-consonant-vowel (VCV) syllables were also investigated. The results showed that reverberant speech signals with various background noises having a SNR of 10 dB can transmit more than 90% of embedded data at 48 bps, with only a small deterioration in the syllable identification scores. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method of High Bit-Rate Data Hiding in Music Using Spline Interpolation

    Page(s): 11 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (251 KB) |  | HTML iconHTML  

    Acoustical signals in digital form can include additional information, this information is separate from the original signal even though they are both stored in a same file. Methods for storing additional information into the original acoustical signal itself have been investigated. Their bit-rate is at most several hundred bit per second. This paper proposes a new method for digital watermarking with higher bit-rate. Its information hiding and detection method is based on spline interpolation. As a result of listening experiment, bit-rate of above 1 kbps was achieved without audible deterioration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Hiding on Lossless Data Compression

    Page(s): 15 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (182 KB) |  | HTML iconHTML  

    We address a new class of Information hiding on lossless data compression. In our model, secret information is embedded into a compressed data (e.g. ZIP) in a way that the compressed data can still be decompressed by regular decompression process (e.g. UNZIP). The entity with secret key can extract the secret information from the compressed data. In this paper, we formally define the above model of information hiding on lossless data compression. Then, we focus on a particular compression method, namely LZSS, which is adopted in ZIP/LHA. We propose a new method, called IH-LZSS, that controls the trade-off between themaximum embeddable data size and compression rate. Some experimental results are also shown. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple Description Coding of an Audio Stream by Optimum Recovery Transform

    Page(s): 19 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (194 KB) |  | HTML iconHTML  

    In this paper, we discuss the mathematical fundamentals of splitting one audio stream into two equal-quality streams. From a trivial consideration, it is found that the sum of errors of two recovered signals is equal to the power of the original signal if the orthogonal recovery is carried out. Next, we describe the optimum recovery transform. This method utilizes the covariance matrix of the signal. We carried out some experiments to recover a signal from one of the split signals. From the results of four kinds of split methods used, the correlating transform of the spectrum gave the best performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audio Watermark Enhanced by LDPC Coding for Air Transmission

    Page(s): 23 - 26
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (335 KB) |  | HTML iconHTML  

    A decrease in the watermark detection rate is a fatal problem in employing audio watermarks for applications in which a watermarked signal is transmitted through the air. The enforcement of watermarks using an error-correcting code is a solution to this problem. Low-density Parity Check (LDPC) coding is a recent error-correcting code; it shows good performance close to Shannon¿s limit. Therefore, in the present study, watermark detection rates when the watermarks were coded combined with and without LDPC coding were evaluated through computer simulations and experiments in a real room. The results showed that employing LDPC coding raised the watermark detection rate by around 15 percentage points for an additive white Gaussian noise and by around 20 points from around 60% to around 80% in an actual reverberation environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Audio Watermarking in Wavelet Domain

    Page(s): 27 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (172 KB) |  | HTML iconHTML  

    A novel approach is proposed for robust audio water- marking in wavelet domain. It emphasizes on enhancing security by dynamically modifying embedding strategy. The modification is based on real-time changes of the water- mark information and host audio. Without using any secret key, informative watermark are embedded into audio with different strength. The distribution of watermarked audio in wavelet domain is relatively similar to clean audio, com- pared to existing watermarking schemes in wavelet domain. The analysis and experimental results are given to demon- strate that the proposed watermarking scheme is effective against common signal processing manipulations and at- tacks, such as Gaussian noise corruption, resampling, re- quantization, MP3 compression and D/A-A/D conversion. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel Capacity Analysis of Spread Spectrum Audio Watermarking for Noisy Environments

    Page(s): 33 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    In this paper channel capacity analysis of spread spectrum audio watermarking (SSW) system for transmission of hidden information through a noisy environment is performed. Channel capacity analysis of algorithm enables us to determine the most reliable transmission rate of hidden information by the watermarking system, i.e. the analysis makes a relation between capacity and robustness as two conflicting features of watermarking algorithms. Examining transmission and detection of hidden information shows that SSW behaves like a binary symmetric channel. It is proved that well known Shannon channel capacity formula for calculating channel capacity is not applicable for SSW system. Instead, analysis of channel capacity for additive color noise channels should be used. Obtaining channel capacity for SSW system using pseudo-noise random sequences with different period, different power of additive white Gaussian noise channel and different power of host signal is performed in simulation results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audio Watermarking Based on Reverberation

    Page(s): 37 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (229 KB) |  | HTML iconHTML  

    To get the best effect of art, the music should be added different artificial reverberation. A new watermarking method based on reverberation theory is proposed in this paper. The embed process same as the process that adds reverberation to recordings in music studio to make it sound quite natural like in a real concert hall. The watermark are embedded by convoluting the original audio signal and a room impulse response that obtained by image method[4]. The parameters for calculating the room impulse response are used as secret key that must be used in the decoding process to ensure security. When decoding, homomorphic deconvolution method is used to separate the kernel function from the cepstrum of the watermarked audio signal, and then take cross-correlation with the delay sequence of room impulse response to get watermark by searching the peak. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Audio Watermarking Algorithm Based on Quantizing Coefficients

    Page(s): 41 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (296 KB) |  | HTML iconHTML  

    A kind of digital audio watermarking algorithm based on discrete wavelet transform (DWT) is proposed in the paper. In the paper, we adopt remote sensing image as watermarking image (such as satellite image). In order to enhance the remote sensing image into the audio, watermarking information is dealt with error diffusion method which is one kind of half-toning technique. Using chaos sequence for synchronization code and embedded it into audio with the water-marking, the watermarking thus has the ability of selfsynchronization. The algorithm quantizes the lowestfrequency coefficients of DWT of the audio signals, so that the watermarking can be detected in a blinding way. The experimental results indicate the algorithm is robust to Gauss-yawp, loss compression and more than 12 attacking means by stirmarkaudio attacking software. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking

    Page(s): 47 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1397 KB) |  | HTML iconHTML  

    The paper proposed a subsampling and quantization based watermarking scheme to resist the permutation attack. The subsampling based watermarking schemes have drawn great attention for its convenience and effectiveness recently, but this kind of watermarking schemes is very vulnerable to the permutation attack. In this paper, the watermark information is embedded into the average values of the 3-level DWT coefficients to resist the permutation attack. Experimental results show that the proposed scheme can resist not only the permutation attack but also some common image processing attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Information Hiding Scheme for OFDM Wireless Networks

    Page(s): 51 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (408 KB) |  | HTML iconHTML  

    The traditional information hiding schemes embed the information into the image, audio and video etc, for the purposes of copyright protection, authentication, and authorized access control etc. In this paper, we propose to embed the data into the physical layer of the baseband Orthogonal Frequency Division Multiplexing (OFDM) wireless networks. We test the information hiding scheme in an additive white Gaussian noise (AWGN) channel. The experimental results indicate that when the number of carriers is limited and the channel SNR is high enough, the proposed information hiding scheme can work effectively, while the OFDM system can also work well as it used to be. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Asymptotic Deterministic Randomness Based Watermarking Scheme

    Page(s): 55 - 58
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (344 KB) |  | HTML iconHTML  

    To improve systems¿ resistance to attack based on symbolic dynamics, this paper presents a new digital watermarking method utilizing asymptotic deterministic randomness. Different from most of the existing chaotic watermarking methods, the asymptotic deterministic randomness with private key is utilized to encrypt watermarking image. The simulation results show that this proposed watermarking system has better security performance than chaotic map watermarking systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis

    Page(s): 59 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (264 KB) |  | HTML iconHTML  

    In this paper, a novel watermarking algorithm is proposed in Contourlet domain with ICA (independent component analysis). Contourlet transform is adopted in watermarking embedding scheme. In contrast to the wavelet transform, a kind of contour segment base are adopted to approach singular curve, and a flexible multiresolution, local, and directional expansion of an image is obtained. Watermarking image is embedded into the most distinct subband in order to obtain robustness. ICA processing is adopted in watermarking detected scheme. The watermarking can be correctly detected by no care about the attack type and attack parameter which the watermarked image would be suffered. To prove the validity of our approach, we give experimental results, our algorithm is robust to JPEG compression and noise attack, and especially robust to geometry attack, filter and image processing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Watermarking Algorithm Adopting Double Embedding

    Page(s): 63 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (423 KB) |  | HTML iconHTML  

    In this paper, an adaptive blind watermarking algorithm is proposed, which presents a new method of block classification based on the characteristic of visual masking of HVS (human visual system) model, including energy and variance. According to the new classification method, classify image blocks and select quantization pedometers adaptively to embed the watermark into DC component. At the same time, because of the shortage of watermark intensity only embedded into DC components, the algorithm presents that the same watermark is embedded into mid-frequency subbands by changing the order of these coefficients under invisibility. This is a blind watermarking algorithm, the watermark can be extracted without the original picture needed. Experimental results and attacks analysis show that the proposed algorithm is effective and robust to common image processing and some geometric attacks, such as JPEG lossy compression, scaling, additive noise, rotation, histogram equilibrium, contrast adjusting, brightness adjusting, filtering and so on. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB Systems

    Page(s): 67 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (225 KB) |  | HTML iconHTML  

    In a digital TV system, the Conditional Access (CA) system is essential to protect programs from unauthorized access. However, the encryption technique alone is not sufficient to protect or control the use of contents after decryption. To provide flexible and complete Digital Rights Management (DRM) protection on the Digital Video Broadcasting (DVB) programs, we propose a method that adapts the MPEG- 21 REL technology and integrates it into a DVB-T system. By extending the Service Information (SI) section of a DVB stream to include an REL license, the transmitted content can be conveniently consumed and legally protected. Our design is verified by an experimental hardware system. The results show that the proposed method can provide both the conditional access functionality and the usage control of broadcasted contents. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Watermarking Based HVS Characteristic of Wavelet Transform

    Page(s): 71 - 74
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (446 KB) |  | HTML iconHTML  

    In a digital TV system, the Conditional Access (CA) system is essential to protect programs from unauthorized access. However, the encryption technique alone is not sufficient to protect or control the use of contents after decryption. To provide flexible and complete Digital Rights Management (DRM) protection on the Digital Video Broadcasting (DVB) programs, we propose a method that adapts the MPEG- 21 REL technology and integrates it into a DVB-T system. By extending the Service Information (SI) section of a DVB stream to include an REL license, the transmitted content can be conveniently consumed and legally protected. Our design is verified by an experimental hardware system. The results show that the proposed method can provide both the conditional access functionality and the usage control of broadcasted contents. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CDMA Based Multiple-User Digital Watermarking

    Page(s): 75 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (657 KB) |  | HTML iconHTML  

    This paper proposes a new type of multi-user digital watermarking based on CDMA, which aims at the demand of multi-user copyright sharing protection. It presents two CDMA based approaches, i.e. wavelet domain direct approach (WD) and wavelet domain neighbor linear prediction approach (WNLP). It analyses the influence of user quantity and embedding depth on the quality of watermarked images and extracted watermarks. Experiment results show that the algorithm can solve the problem of watermarks collision and relieve the restriction of user quantity of multiple watermarking algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Watermarking Resisting to Geometrical Attacks Based on Histogram

    Page(s): 79 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (204 KB) |  | HTML iconHTML  

    At present, most image watermarking scheme can not resist geometrical attacks, which restricts the application of digital watermarking techniques. In this paper, an image watermarking scheme based on histogram is proposed, since the histogram is not sensitive to geometrical transformation. Different groups of the image histogram bars are chosen, and the message is embedded to sum of every group by using Quantization Index Modulation (QIM). In watermark embedding scheme, an exact modification from histogram to image is proposed, and it can guarantee the distortion of image as little as possible. In watermark detection process, the same groups of image histogram bars are selected, and the message is extracted from the sum of each group by using nearest distance rule. Experimental results show the scheme is robust to geometrical attacks as well as compression and filtering. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.