2006 International Conference on Intelligent Information Hiding and Multimedia

18-20 Dec. 2006

Filter Results

Displaying Results 1 - 25 of 173
  • 2006 International Conference on Intelligent Information Hiding and Multimedia - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • 2006 International Conference on Intelligent Information Hiding and Multimedia - Title page

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • 2006 International Conference on Intelligent Information Hiding and Multimedia - Copyright notice

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • 2006 International Conference on Intelligent Information Hiding and Multimedia -TOC

    Publication Year: 2006, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2006, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (40 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006, Page(s):xvi - xxii
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Spread Spectrum Audio Steganography Using Sub-band Phase Shifting

    Publication Year: 2006, Page(s):3 - 6
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    This paper presents an improvement of spread spectrum audio data hiding methods. We introduce phase shifting in audio signals to reduce the correlation with PN signal per each sub-band. It allows easy detection of the embedded data signal from audio when de-spreading the compound signal. The paper reports the subjective test results and the measurements of noise resiliency. The proposed method gen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Hiding in Speech Sounds Using Subband Amplitude Modulation Robust against Reverberations and Background Noise

    Publication Year: 2006, Page(s):7 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    Data hiding in audio signals can be used for transmitting auxiliary information related to the content of the audio signal. Such an application requires a greater data payload than music copyright management systems. Also, it is difficult to extract the embedded data from sounds played through a loudspeaker and detected by a microphone because of additive background noise, reflections and reverber... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method of High Bit-Rate Data Hiding in Music Using Spline Interpolation

    Publication Year: 2006, Page(s):11 - 14
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    Acoustical signals in digital form can include additional information, this information is separate from the original signal even though they are both stored in a same file. Methods for storing additional information into the original acoustical signal itself have been investigated. Their bit-rate is at most several hundred bit per second. This paper proposes a new method for digital watermarking ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Hiding on Lossless Data Compression

    Publication Year: 2006, Page(s):15 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    We address a new class of Information hiding on lossless data compression. In our model, secret information is embedded into a compressed data (e.g. ZIP) in a way that the compressed data can still be decompressed by regular decompression process (e.g. UNZIP). The entity with secret key can extract the secret information from the compressed data. In this paper, we formally define the above model o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple Description Coding of an Audio Stream by Optimum Recovery Transform

    Publication Year: 2006, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    In this paper, we discuss the mathematical fundamentals of splitting one audio stream into two equal-quality streams. From a trivial consideration, it is found that the sum of errors of two recovered signals is equal to the power of the original signal if the orthogonal recovery is carried out. Next, we describe the optimum recovery transform. This method utilizes the covariance matrix of the sign... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audio Watermark Enhanced by LDPC Coding for Air Transmission

    Publication Year: 2006, Page(s):23 - 26
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    A decrease in the watermark detection rate is a fatal problem in employing audio watermarks for applications in which a watermarked signal is transmitted through the air. The enforcement of watermarks using an error-correcting code is a solution to this problem. Low-density Parity Check (LDPC) coding is a recent error-correcting code; it shows good performance close to Shannon¿s limit. Therefore,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Audio Watermarking in Wavelet Domain

    Publication Year: 2006, Page(s):27 - 32
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    A novel approach is proposed for robust audio water- marking in wavelet domain. It emphasizes on enhancing security by dynamically modifying embedding strategy. The modification is based on real-time changes of the water- mark information and host audio. Without using any secret key, informative watermark are embedded into audio with different strength. The distribution of watermarked audio in wav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel Capacity Analysis of Spread Spectrum Audio Watermarking for Noisy Environments

    Publication Year: 2006, Page(s):33 - 36
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    In this paper channel capacity analysis of spread spectrum audio watermarking (SSW) system for transmission of hidden information through a noisy environment is performed. Channel capacity analysis of algorithm enables us to determine the most reliable transmission rate of hidden information by the watermarking system, i.e. the analysis makes a relation between capacity and robustness as two confl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audio Watermarking Based on Reverberation

    Publication Year: 2006, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    To get the best effect of art, the music should be added different artificial reverberation. A new watermarking method based on reverberation theory is proposed in this paper. The embed process same as the process that adds reverberation to recordings in music studio to make it sound quite natural like in a real concert hall. The watermark are embedded by convoluting the original audio signal and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Audio Watermarking Algorithm Based on Quantizing Coefficients

    Publication Year: 2006, Page(s):41 - 46
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    A kind of digital audio watermarking algorithm based on discrete wavelet transform (DWT) is proposed in the paper. In the paper, we adopt remote sensing image as watermarking image (such as satellite image). In order to enhance the remote sensing image into the audio, watermarking information is dealt with error diffusion method which is one kind of half-toning technique. Using chaos sequence for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking

    Publication Year: 2006, Page(s):47 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1397 KB) | HTML iconHTML

    The paper proposed a subsampling and quantization based watermarking scheme to resist the permutation attack. The subsampling based watermarking schemes have drawn great attention for its convenience and effectiveness recently, but this kind of watermarking schemes is very vulnerable to the permutation attack. In this paper, the watermark information is embedded into the average values of the 3-le... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Information Hiding Scheme for OFDM Wireless Networks

    Publication Year: 2006, Page(s):51 - 54
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    The traditional information hiding schemes embed the information into the image, audio and video etc, for the purposes of copyright protection, authentication, and authorized access control etc. In this paper, we propose to embed the data into the physical layer of the baseband Orthogonal Frequency Division Multiplexing (OFDM) wireless networks. We test the information hiding scheme in an additive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Asymptotic Deterministic Randomness Based Watermarking Scheme

    Publication Year: 2006, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    To improve systems¿ resistance to attack based on symbolic dynamics, this paper presents a new digital watermarking method utilizing asymptotic deterministic randomness. Different from most of the existing chaotic watermarking methods, the asymptotic deterministic randomness with private key is utilized to encrypt watermarking image. The simulation results show that this proposed watermarking sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis

    Publication Year: 2006, Page(s):59 - 62
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    In this paper, a novel watermarking algorithm is proposed in Contourlet domain with ICA (independent component analysis). Contourlet transform is adopted in watermarking embedding scheme. In contrast to the wavelet transform, a kind of contour segment base are adopted to approach singular curve, and a flexible multiresolution, local, and directional expansion of an image is obtained. Watermarking ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Watermarking Algorithm Adopting Double Embedding

    Publication Year: 2006, Page(s):63 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    In this paper, an adaptive blind watermarking algorithm is proposed, which presents a new method of block classification based on the characteristic of visual masking of HVS (human visual system) model, including energy and variance. According to the new classification method, classify image blocks and select quantization pedometers adaptively to embed the watermark into DC component. At the same ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Digital Content Protection Scheme Using MPEG-21 REL with Applications to DVB Systems

    Publication Year: 2006, Page(s):67 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    In a digital TV system, the Conditional Access (CA) system is essential to protect programs from unauthorized access. However, the encryption technique alone is not sufficient to protect or control the use of contents after decryption. To provide flexible and complete Digital Rights Management (DRM) protection on the Digital Video Broadcasting (DVB) programs, we propose a method that adapts the MP... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Watermarking Based HVS Characteristic of Wavelet Transform

    Publication Year: 2006, Page(s):71 - 74
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    In a digital TV system, the Conditional Access (CA) system is essential to protect programs from unauthorized access. However, the encryption technique alone is not sufficient to protect or control the use of contents after decryption. To provide flexible and complete Digital Rights Management (DRM) protection on the Digital Video Broadcasting (DVB) programs, we propose a method that adapts the MP... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CDMA Based Multiple-User Digital Watermarking

    Publication Year: 2006, Page(s):75 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (657 KB) | HTML iconHTML

    This paper proposes a new type of multi-user digital watermarking based on CDMA, which aims at the demand of multi-user copyright sharing protection. It presents two CDMA based approaches, i.e. wavelet domain direct approach (WD) and wavelet domain neighbor linear prediction approach (WNLP). It analyses the influence of user quantity and embedding depth on the quality of watermarked images and ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Watermarking Resisting to Geometrical Attacks Based on Histogram

    Publication Year: 2006, Page(s):79 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    At present, most image watermarking scheme can not resist geometrical attacks, which restricts the application of digital watermarking techniques. In this paper, an image watermarking scheme based on histogram is proposed, since the histogram is not sensitive to geometrical transformation. Different groups of the image histogram bars are chosen, and the message is embedded to sum of every group by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.