Translator Disclaimer
8 May 2012 Blind extraction and security analysis of spread spectrum hidden watermarks
Author Affiliations +
In the area of covert network communications, the focus has been on spread spectrum (SS) techniques using correlated host data, applicable to many data hiding and covert communications applications. Our work relates to the Iterative Generalized Least Squares (IGLS) blind signature recovery algorithm of Gkizeli et al. 1, and can be summarized as follows: (1) We have performed extensive Monte Carlo simulations that characterize the convergence properties of the algorithm as a function of signature length, host distortion, and number of hidden bits; (2) We have developed and characterized the behavior of a fully blind extension of the IGLS algorithm, called the BC-IGLS (Blind IGLS using Clustering); (3) We have developed and performed a characterization study of an extension to the IGLS algorithm, called the MS-IGLS (Multi Signature IGLS), that performs blind extraction of multiple signatures in multi-user embedding applications2.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
John A. Marsh and Gerard F. Wohlrab "Blind extraction and security analysis of spread spectrum hidden watermarks", Proc. SPIE 8408, Cyber Sensing 2012, 84080W (8 May 2012);


Security of spread-spectrum-based data hiding
Proceedings of SPIE (February 26 2007)
Two different approaches for attacking BOWS
Proceedings of SPIE (February 26 2007)
Steganography capacity: a steganalysis perspective
Proceedings of SPIE (June 19 2003)

Back to Top