Capacity bounds and constructions for reversible data-hiding

被引:76
作者
Kalker, T [1 ]
Willems, FMJ [1 ]
机构
[1] Eindhoven Univ Technol, NL-5600 MB Eindhoven, Netherlands
来源
DSP 2002: 14TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING PROCEEDINGS, VOLS 1 AND 2 | 2002年
关键词
D O I
10.1109/ICDSP.2002.1027818
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An undesirable side effect of many watermarking and data-hiding schemes is that the host signal into which auxiliary data is embedded is distorted. Finding an optimal balance between the amount of information embedded and the induced distortion is therefore an active field of research. In recent years, with the rediscovery of Costa's seminal paper Writing on Dirty Paper, there has been considerable progress in understanding the fundamental limits of the capacity versus distortion of watermarking and data-hiding schemes. For some applications, however, no distortion resulting from auxiliary data, however small, is allowed. In these cases the use of reversible data-hiding methods provide a way out. A reversible data-hiding scheme is defined as a scheme that allows complete and blind restoration (i.e. without additional signaling) of the original host data. Practical reversible data-hiding schemes have been proposed by Fridrich et al., but little attention has been paid to the theoretical limits. It is the purpose of this paper to repair this situation and to provide some first results on the limits of reversible data-hiding. Admittedly, the examples provided in this paper are toy examples, but they are indicative of more practical schemes that will be presented in subsequent papers.
引用
收藏
页码:71 / 76
页数:6
相关论文
共 7 条
[1]  
BARRON R, 2000, THESIS MIT
[2]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[3]  
CHEN B, 2000, THESIS MIT
[4]   WRITING ON DIRTY PAPER [J].
COSTA, MHM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (03) :439-441
[5]  
FRIDRICH J, 2002, P SPIE SEC WAT MULT
[6]  
MOULIN P, 1999, INFORMATION THEORETI
[7]  
van Dijk M., 2001, P 22 S INF COMM THEO, P147