طرح نهان نگاری کاربردی براساس طیف گسترده و تئوری بازی
|کد مقاله||سال انتشار||تعداد صفحات مقاله انگلیسی||ترجمه فارسی|
|7117||2003||14 صفحه PDF||سفارش دهید|
نسخه انگلیسی مقاله همین الان قابل دانلود است.
هزینه ترجمه مقاله بر اساس تعداد کلمات مقاله انگلیسی محاسبه می شود.
این مقاله تقریباً شامل 7353 کلمه می باشد.
هزینه ترجمه مقاله توسط مترجمان با تجربه، طبق جدول زیر محاسبه می شود:
|شرح||تعرفه ترجمه||زمان تحویل||جمع هزینه|
|ترجمه تخصصی - سرعت عادی||هر کلمه 90 تومان||11 روز بعد از پرداخت||661,770 تومان|
|ترجمه تخصصی - سرعت فوری||هر کلمه 180 تومان||6 روز بعد از پرداخت||1,323,540 تومان|
Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)
Journal : Signal Processing: Image Communication, Volume 18, Issue 4, April 2003, Pages 283–296
In this paper, we consider the implementation of robust watermarking scheme for non-i.i.d. Gaussian signals and distortion based on perceptual metrics. We consider this problem as a communication problem and formulated it as a game between an attacker and an embedder in order to establish its theoretical performance. We first show that known parallel Gaussian channels technique does not lead to valid practical implementation, and then propose a new scheme based on Wide Spread Spectrum and Side Information. Theoretical performances of this scheme are established and shown to be very close to the upper bound on capacity defined by Parallel Gaussian channels. Practical implementation of this scheme is then presented and influence of the different parameters on performance is discussed. Finally, experimental results for image watermarking are presented and validate the proposed scheme.
A lot of effort has been dedicated over the last years for designing practical watermarking systems. The approaches were often viewing the media content as noise from the watermark detection perspective, hence regarding watermarking as a form of wide spread spectrum communication (WSS) with various forms of distortion measures (MSE or weighted MSE) and of channel characterizations ,  and . The authors in  suggest to take into account the perceptual properties of the content and to embed in perceptually significant frequency components. Other approaches based on WSS and exploiting the perceptual sensitivity of the host data can also be found in ,  and . However these techniques are based on empirical assumptions. Attacks have often been modeled as the addition of White Gaussian noise (AWGN)  and , and more recently as linear filtering plus white or colored additive noise  and . It has been shown in  and  that expressing the problem of watermarking as a problem of communication with side information leads to optimal performances. Costa  has indeed shown that in the context of attacks modeled by AWGN, the capacity is not dependent on the cover signal. However the solution proposed, known as the Ideal Costa Scheme (ICS), requires very large codebooks, hence is not realistic. Different approaches have then been proposed to reach performances of Costa's scheme using structured codebooks; Scalar Costa Scheme (SCS) , syndrome based coding  or more recently trellis with multiple paths . Dithered quantization techniques  and  may also be seen as techniques exploiting side information. Most of these schemes are defined for i.i.d. signals which is not a valid assumption for usual considered signals. Techniques based on parallel-Gaussian channels  and  have then been proposed to deal with such non-i.i.d. Gaussian signals. However practical implementation of Parallel-Gaussian necessitates to know the original signal  and does not lead to a valid implementation (see discussion in Section 2). This paper deals with the robust data hiding problem, assuming a blind (the extraction system has no knowledge of the host signal) and symmetric (same private key for embedding and extraction) system. In this paper we consider this problem as a communication problem: one seeks the maximum hiding capacity (or rate of reliable transmission) over any hiding and attack strategies. The rate obviously depends on the perceptual distortion levels considered admissible and on the watermark channel (or attack scenarios) characterization. We especially present a technique based on Wide Spread Spectrum and Side Information facing Scaling and Additive White Gaussian Noise (SAWGN) optimized by considering Game Theory formalism in order to define performance limits. Practical implementation as well as efficiency of the proposed technique are further presented. This paper is organized as follows. In Section 2, general consideration about watermarking of non-i.i.d. signals is first presented as well as limitation of the previously proposed techniques. In Section 3, we then present an optimized watermarking scheme based on Wide Spread Spectrum and Side Information and discuss about its practical implementation. In Section 4, experimental results are shown for image watermarking. Finally Section 5 concludes this work.
نتیجه گیری انگلیسی
In this paper we have studied the implementation of a practical watermarking scheme for non-i.i.d. Gaussian signals and perceptual metrics for distortion. We have first shown that theoretical approach based on parallel Gaussian channels should not be perform with embedding/extraction on separate channels. We then reformulated the watermarking problem considering global embedding/extraction based on WSS and Side Information. Theoretical performances of this scheme has been established by considering a game between an attacker and the embedder for SAWGN attacks. This watermarking scheme leads to a practical implementation of Side Information scheme with performance very close to the upper-bound defined by parallel Gaussian Channels. Application to image watermarking has been validated by successfully resisting to all non geometrical Stirmark attacks.