Title :
Scalar Costa scheme for information embedding
Author :
Eggers, Joachim J. ; Bauml, Robert ; Tzschoppe, Roman ; Girod, Bernd
Author_Institution :
Lehrstuhl fur Nachrichtentechnik, Univ. Erlangen-Nurnberg, Erlangen, Germany
fDate :
4/1/2003 12:00:00 AM
Abstract :
Research on information embedding, particularly information hiding techniques, has received considerable attention within the last years due to its potential application in multimedia security. Digital watermarking, which is an information hiding technique where the embedded information is robust against malicious or accidental attacks, might offer new possibilities to enforce the copyrights of multimedia data. In this paper, the specific case of information embedding into independent identically distributed (IID) data and attacks by additive white Gaussian noise (AWGN) is considered. The original data is not available to the decoder. For Gaussian data, in 1983, Costa proposed a scheme that theoretically achieves the capacity of this communication scenario. However, Costa´s scheme is not practical. Thus, several research groups have proposed suboptimal practical communication schemes based on Costa´s idea. The goal of this paper is to give a complete performance analysis of the scalar Costa scheme (SCS), which is a suboptimal technique using scalar embedding and reception functions. Information theoretic bounds and simulation results with state-of-the-art coding techniques are compared. Further, reception after amplitude scaling attacks and the invertibility of SCS embedding are investigated.
Keywords :
AWGN; channel coding; data encapsulation; decoding; encoding; information theory; multimedia communication; security of data; watermarking; AWGN; Gaussian data; accidental attacks; additive white Gaussian noise; amplitude scaling attacks; channel coding; coding; copyright; decoder; digital watermarking; i.i.d. attacks; i.i.d. data; independent identically distributed data; information embedding; information hiding techniques; information theoretic bounds; malicious attacks; multimedia data; multimedia security; performance analysis; reception functions; scalar Costa scheme; scalar embedding; simulation results; suboptimal practical communication schemes; AWGN; Additive white noise; Data security; Decoding; Information retrieval; Information security; Noise robustness; Performance analysis; Watermarking;
Journal_Title :
Signal Processing, IEEE Transactions on
DOI :
10.1109/TSP.2003.809366