ImageVerifierCode 换一换
格式:DOCX , 页数:20 ,大小:371.05KB ,
资源ID:10461899      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/10461899.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(Reliable information hiding based on support vector machine.docx)为本站会员(b****7)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

Reliable information hiding based on support vector machine.docx

1、Reliable information hiding based on support vector machineReliable Information Hiding Based on Support Vector MachineYong-Gang Fu1,3, Rui-Min Shen1, Li-Ping Shen1 and Xu-Sheng Lei21Dept. of Computer Science and Engineering, Shanghai Jiaotong Univ., Shanghai, China, 2000302Dept. of Automation, Shang

2、hai Jiaotong Univ., Shanghai, China, 2000303Dept. of Software, Xiamen Univ., Xiamen, Chian, 361000E-mails: fyg, rmshen,lpshen, xushengleiAbstract: In this paper, a reliable information hiding scheme based on support vector machine and error correcting codes is proposed. To extract the hidden informa

3、tion bits from a possibly tampered watermarked image with a lower error probability, information hiding is modeled as a digital communication problem, and both the good generalization ability of support vector machine and the error correction code BCH are applied. Due to the good learning ability of

4、 support vector machine, it can learn the relationship between the hidden information and corresponding watermarked image; when the watermarked image is attacked by some intentional or unintentional attacks, the trained support vector machine can recover the right hidden information bits. The reliab

5、ility of the proposed scheme has been tested under different attacks. The experimental results show that the embedded information bits are perceptually transparent and can successfully resist common image processing, jitter attack, and geometrical distortions. When the host image is heavily distorte

6、d, the hidden information can also be extracted recognizably, while most of existing methods are defeated. We expect this approach provide an alternative way for reliable information hiding by applying machine learning technologies.Key words: Information hiding; Support vector machine; Digital water

7、marking; BCH coding1. IntroductionDigital properties are readily reproduced and redistributed over the Internet and other medias. However these attractive properties lead to problems enforcing copyright protection issues. As a result, the contributor and distributor of the digital properties are hes

8、itant to provide the access to their intellectual properties. It is realized that conventional cryptographic means are not sufficient since the data is without any protection as soon as it is used, e.g., decrypted and displayed in the case of image or video data. A potential approach to solve this p

9、roblem is information hiding or digital watermarking (Swanson et al., 1998). Information hiding is the imperceptible embedding of information bits (signature) into multimedia data, where the information remains detectable as long the quality of the content itself is not rendered useless. As a branch

10、 of information hiding, it is commonly assumed that digital watermarking is only one of several measures that have to be combined to build a good copy protection mechanism (Furon and Duhamel, 2000). A significant merit of digital watermarking over traditional protection methods is to provide a seaml

11、ess interface, so that users are still able to utilize the protected multimedia transparently. An information hiding scheme should at least meet the following requirements: (1) Perceptual invisible (or transparent). (2) Difficult to remove without seriously affecting the image quality. (3) Robust re

12、sistance to image processing, and attacks. Developing an algorithm capable of producing signature that fulfills all these requirements is not an easy task. On one hand, the information hiding process should not introduce any perceptible artifacts into the host image. On the other hand, for high robu

13、stness it is desirable that the mark amplitude is as high as possible. Therefore, the designation of information hiding method always involves a tradeoff between imperceptibility (or transparency) and robustness. A variety of watermarking or information hiding schemes have been reported recently in

14、the literature, and some nice reviews can be found in (Fabien et al., 1999). However, the research on copyright protection of images is still in its early stage and none of the existing methods is totally effective against malicious attacks. There are a variety of schemes for hiding information into

15、 the original image. Typical schemes for the information hiding in images can be broadly classified into two categories: (i) spatial domain methods which embed the data by directly modifying the pixel values of the original image (Nikolaidis and Pitas, 1998); (ii) transform domain methods which embe

16、d the data by modulating the coefficients of properly chosen transform domain such as DCT (Cox et al., 1997; Barni et al., 2000), DFT (Barni et al., 2000), and DWT (Xia et al., 1998). Many of the spatial domain techniques provide simple and effective schemes for embedding an invisible watermark into

17、 an image but are not robust to common attacks. Information hiding techniques can be alternatively split into two distinct categories depending on whether the original image is necessary for the watermark extraction or not. Although the existence of the original image facilitates watermark extractio

18、n (Cox et al., 1997; Swanson et al.1996; Podilchuk and Zeng, 1998) to great extent, such a requirement raises two problems: (i) owner of the original image is compelled insecurely to share his works with anyone who wants to check the existence of the signature (Barni et al., 1998), (ii) on the other

19、 hand, the searching within the database for the original image that corresponds to a given watermarked image would be very time consuming. Thus, methods capable of revealing the information bits presence without comparing the watermarked and original images would be preferable. In order to design r

20、obust information hiding scheme, Cox et al. considered watermarking as a problem of communication with side information (Cox et al., 1999). Also, some watermarking algorithm in literature applied error correcting coding(ECC) to improve the bit error rate(BER) performance, such as Bose-Chaudhuri-Hocq

21、uenghen(BCH) coding (Huang et al.1998; Huang and Yun, 2002), Reed-Solomon(R-S) code (Wu and Hsieh, 2000), and Turbo code (Pereira and Pun, 2000). Recently, efforts are made to use artificial intelligence technique for watermark embedding and extraction. Neural networks are introduced into watermarki

22、ng in (Yu et al., 2001), which makes the watermark extraction more robust against common attacks. Genetic algorithm is proposed for selection of the best embedding positions in block based DCT domain watermarking (Shieh et al., 2004). We have firstly introduced the support vector machine for the wat

23、ermark embedding and extraction in (Fu et al., 2004), in which the watermark is embedded into the host by applying the good learning ability of support vector regression machine, and the watermark extraction is finished by the aids of the well trained support vector machine. We can expect that the c

24、ombination of information hiding and machine learning techniques might be a good solution for reliable information hiding. From the observations above, in this paper we propose a novel blind reliable information hiding and recovering scheme which makes use of support vector machine and BCH coding. T

25、his work can be considered as an extension of some existing research (Kutter et al.,1998; Yu et al.,2001; Fu et al., 2004). In (Kutter et al., 1998), Kutter proposed a spatial domain watermarking scheme for color image. Then Yu (Yu et al., 2001) improved Kutters method by applying neural networks. D

26、ue to the support vector machines good learning ability in training process, it can memorize the relationship between the embedded information and corresponding watermarked image. Applying SVMs good generalization abilities and error correcting ability of BCH coding, hidden information extraction ca

27、n be finished well. Experimental results show good robustness of the proposed scheme against common image processing and attacks. This research is much different from my early work. In this research, the support vector machine is only trained and applied in the information extraction procedure, wher

28、eas, in (Fu et al., 2004), the support vector regression machine is applied both in the watermark embedding and extraction process.The paper is organized as follows: in section 2, basic conceptions for support vector machine are introduced. The embedding and extraction algorithms of our method are d

29、escribed in section 3. In section 4, some experimental results are exhibited. The conclusion is stated in section 5.2. An overview of Support Vector MachineSupport Vector Machine (SVM) is a universal classification algorithm developed by Vapnik and his colleagues (Vapnik, 1995; Vapnik, 1998). In rec

30、ent years, there have been a lot of interests in studying the applications of SVM on function approximation, pattern recognition problems and so on (Campbell, 2002; Christopher, 1998).Given a training data set of m samples, whereis the ith input pattern andis the ith output pattern. The support vect

31、or machine method supposes we have some hyper-planes that separate the positive samples from negative ones. The pointwhich lies on the hyper-plane satisfies whereis normal to the hyper-plane, is the perpendicular distance from the hyper-plane to the origin, and is the Euclidean norm of. For the line

32、arly separable case, the support vector algorithm simply looks for the separating hyper-plane with the largest margin. This can be formulated as following: suppose that all the training data satisfy the following constraints: (1)This can be combined into one set of inequalities: (2)Now consider the points for which the equality in (1) holds. These points lie on the hyper-plane with normaland perpendicular distance from the origin. Similarly, the points for which the equality holds in (1) lie on the hyper-plane, with normal, and perpendicular distance from the origin. Hence the

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1