Hexagonal quantizers are not optimal for 2-D data hiding

被引:1
作者
Balado, F [1 ]
Pérez-Gonzàlez, F [1 ]
机构
[1] Univ Vigo, Signal Theory & Commun Dept, E-36200 Vigo, Spain
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V | 2003年 / 5020卷
关键词
data hiding; hexagonal lattice coding; projection quantization; quantization index modulation;
D O I
10.1117/12.476842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data hiding using quantization has revealed as an effective way of taking into account side information at the encoder. When quantizing more than one host signal samples there are two choices: 1) using the Cartesian product of several one-dimensional quantizers, as made in Scalar Costa Scheme (SCS); or 2) performing vectorial quantization. The second option seems better, as rate-distortion theory affirms that higher dimensional quantizers yield improved performance due to better sphere-packing properties. Although the embedding problem does resemble that of rate-distortion, no attacks or host signal characteristics are usually considered when designing the quantizer in this way. We show that attacks worsen the performance of the a priori optimal lattice quantizer through a counterexample: the comparison under Gaussian distortion of hexagonal lattice quantization against bidimensional Distortion-Compensated Quantized Projection (DC-QP), a data hiding alternative based in quantizing a linear projection of the host signal. Apart from empirical comparisons, theoretical lower bounds on the probability of decoding error of hexagonal lattices under Gaussian host signal and attack are provided and compared to the already analyzed DC-QP method.
引用
收藏
页码:623 / 631
页数:9
相关论文
共 10 条
[1]   Quantizer characteristics important for Quantization Index Modulation [J].
Brunk, H .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 :686-694
[2]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[3]  
CHOU J, 2000, P SPIE IM VID COMM P, V3974, P301
[4]  
CONWAY JH, 1999, COMPREHENSIVE STUDIE, V290
[5]  
Craig J. W., 1991, P IEEE MIL COMM C MI, P571
[6]  
EGGERS JJ, 2000, P IEE C SEC IM IM AU
[7]  
GERSHO A, 1979, IEEE T INFORM THEORY, V25, P373, DOI 10.1109/TIT.1979.1056067
[8]  
KESAL M, 2000, P 2 S TURB COD THEIR
[9]  
PEREZGONZALEZ F, 2003, IEEE T SIGN PROC
[10]  
SIMON MK, 2000, WILEY SERIES TELECOM