亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        QIM digital watermarking based on LDPC code and message passing under scaling attacks

        2014-09-07 03:23:32CUIXinYANBinJIAXiaWANGYafei

        CUI Xin, YAN Bin, JIA Xia, WANG Ya-fei

        (College of Information and Electrical Engineering, Shandong University of Science and Technology, Qingdao 266590, China)

        The advent of Internet and other public information sharing networks has given rise to a multitude of applications in which data hiding plays a very important role.In particular, simple desynchronization operation can have a catastrophic impact on performance of the decoder, usually measured via the probability of correctly decoded hidden da-ta[1,2].In Ref.[3], a repetition code-aided quantization index modulation (QIM) watermarking algorithm, factor graph (FG) repetition code, is proposed.However, the transmission rate is low.Motivated by the iterative decoding theory, a low density parity check (LDPC) code-aided QIM watermarking algorithm, FG-LDPC, is proposed in this paper, which uses message passing in watermark decoding stage.The amplitude scaling parameters can be estimated based on LDPC code decoding and message passing on Forney style factor graph (FFG).Meanwhile, the newly estimated parameter estimation can be used to improve the performance of decoder in the next decoding iteration.Thus, it is an effective method against amplitude scaling attacks.

        1 System model

        The watermarking system model proposed in this paper is illustrated in Fig.1.

        Fig.1 Model of watermarking and desynchronization attacks

        2 Factor graph model and message passing algorithm

        In general, an FFG consists of nodes, edges, and half edges which are connected only to one node.An edge is defined as a variable and a node is defined as a function of several variables[4,5].In this paper, three nodes are applied to the watermarking system model, as shown in Table 1.

        Table 1 Three FFG nodes in system model

        According to the notation in Table 1 and using the basic sum-product rule, each model of FFG nodes is established and its corresponding message passing updating algorithms are designed[6].The results are shown in Tables 2, 3 and 4.

        Table 2 Adding node model and message updating rule

        Table3Amplitudescalingnodemodelandmessageupdatingrule

        μA→xk(xk)∝μθk-1→A(θk-1)·μθk→A(θk)·∑xk∈Λ0∪Λ1μzk→A(θkxk)μA→θk(θk)∝μθk-1→A(θk-1)·∑xk∈Λ0∪Λ1μxk→A(xk)·μzk→A(xkθk)

        whereμ→(·) is the message from original node to target node.The symbolpwk(·) andpSk(·) are denoted as the PDF of AWGN and that of host sequence, respectively.The symbolΛ0andΛ1are denoted as the quantification of lattice 0 and that of 1, respectively.The symbolθkdenotes the amplitude scaling parameter.The symbolQbk(·) is used to denote the quantizer of QIM[7,8].

        Table 4 Embedding node model and message updating rule

        In addition to local message passing rules, a global message passing schedule must be specified.Here we use a natural message passing schedule: The message is updated from the channel output data to the codewords.

        Step 1: Update the message in the adding node;

        Step 2: Update the message in the embedding node upward;

        Step 3: Update the message in the embedding node downward;

        Step 4: Update the message in the amplitude scaling node.Using “Step 1” and “Step 3” to compute amplitude scaling right message which contains N branches.Then the original amplitude scaling right message can be updated by it.

        Step 5: Circle the whole message passing algorithm until the decoded codeword does not change over iterations.

        3 Simulation results

        To test the performance of the FG-LDPC algorithm proposed in this paper, simulation is conducted.The watermarking signal is encoded by regular (3, 6) LDPC code.The code rate is 1/2 and code length is 4 000.In the simulation, the host-to-watermark (HWR) is 25 dB and the host signal standard deviation is 50 dB.Fig.2 shows the simulation results of FG-LDPC algorithm.Here, the symbol WNR is denoted as the watermark-to-noise ratio.

        It can be seen from Fig.2, FG-LDPC algorithm is closer to Shannon limit than FG-repetition code algorithm[9,10].Compared with FG-repetition code algorithm, FG-LDPC algorithm has a good performance when the system is attacked by AWGN.

        In Fig.3, amplitude scaling parameters conform to the uniform distribution in the region of [0, 2].We test the accuracy of amplitude scaling parameter estimation when FG-LDPC algorithm is attacked by amplitude scaling and AWGN.The results show that the algorithm can estimate amplitude scaling parameter with low WNR.

        Fig.2 Performance of FG-LDPC algorithm

        Fig.3 Accuracy of amplitude scaling parameter estimation with FG-LDPC algorithm (WNR: 3 dB)

        Fig.4 Stability of amplitude scaling parameter estimation (host: Gaussion)

        In Fig.4, the stability of amplitude scaling parameter estimation is tested.In different WNRs, the volatility of the curve is so small that it can be concluded that the algorithm can reach stability when estimating the scaling parameters.Meanwhile, the better performance of parameter estimation can be achieved with the increase of WNR.

        In Fig.5, we test the performance of FG-LDPC algorithm when the algorithm is attacked by amplitude scaling.Compared with the algorithm, the simulation results show that the algorithm can obtain similar performance without desynchronization.Compared with the situation that is no code aided or only 10-pilot aided, FG-LDPC algorithm has better performance.

        Fig.5 FG-LDPC algorithm with amplitude scaling

        4 Conclusion

        Using the framework of iterative estimation and decoding, LDPC coded QIM watermarking system is closer to dirty paper Shannon limit than repetition coded system.In addition, it is superior to pilot based system.

        [1] Cox I J, Miller M L, Bloom J A.Digital watermarking.Beijing: Publishing House of Electronics Industry, 2002: 78-103.

        [2] Moulin P, Briassouli A, Malvar H.Detection-theoretic analysis of desynchronization attacks in watermarking.In: Proceedings of the 14th International Conference on Digital Signal Processing, Santorini, Greece, 2002, 1: 77-84.

        [3] Sadasive S, Moulin P.A message passing approach to combating desynchronization attacks.IEEE Transactions on Information Forensics Security, 2011, 6(6): 1-13.

        [4] Loeliger H A.An introduction to factor graphs.IEEE Signal Processing Magazine, 2004, 21(1): 28-41.

        [5] Loeliger H A, Dauwels J, HU Jun-li, et al.The factor graph approach to model-based signal processing.In: Proceedings of the IEEE, 2007, 95: 1295-1322.[doi:10.1109/JPROC.2007.896497]

        [6] Dauwels J H G.On graphical models for communications and machine learning: algorithms, bounds, and analog implementation.Series in Signal and Information Processing, 2006, 17: 100-150.

        [7] Chen B, Wornel G W.Preprocessed and post-processed quantization index modulation methods for digital watermarking.In: Proceedings of International Society for Optics and Photonics: Security and Watermarking of Multimedia Contents II, 2000, 3971: 48-59.

        [8] Borne D V D, Kalker T, Willems F.Codes for writing on dirty paper.In: Proceedings of the 23rd Symposium on Information Theory, Benelux, 2002: 45-52.

        [9] Perez-Gonzalez F, Hernandez J R, Balad F.Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications.Signal Processing, 2011, 81: 1215-1238.

        [10] Johnson S J.Iterative error correction.UK: Cambridge University Press, 2010: 34-279.

        极品粉嫩小仙女高潮喷水操av| 亚洲中文字幕无码卡通动漫野外| 最新在线观看精品国产福利片| 高潮av一区二区三区| 好大好爽我要高潮在线观看| 久久久久亚洲av无码专区首jn| 亚洲另类国产综合第一| 欧美—iGAO视频网| 日本视频一区二区三区在线 | 美腿丝袜美腿国产在线| 亚洲国产精品区在线观看| 内射合集对白在线| 国产精品一区二区久久| 亚洲无码啊啊啊免费体验| 国产麻豆剧传媒精品国产av| 中文字幕色av一区二区三区| 中文字幕人妻中文av不卡专区| 99热这里只有精品久久6| 日本美女中文字幕第一区| 国产成人精品日本亚洲专区61| 精品人人妻人人澡人人爽牛牛| 亚洲无码图| 粉嫩人妻91精品视色在线看| 先锋中文字幕在线资源| 久久99国产乱子伦精品免费| 亚洲每天色在线观看视频| 日本一二三四区在线观看| 中文字幕人妻中文| 国产在视频线精品视频www666| av资源在线播放网站| 婷婷色国产精品视频二区| 婷婷亚洲久悠悠色悠在线播放 | 久久久久无码中文字幕| 日本成人精品在线播放| 日本高清视频xxxxx| 试看男女炮交视频一区二区三区| 亚洲一区久久久狠婷婷| 国产自拍av在线观看视频| 天堂8中文在线最新版在线| 亚洲一区区| av免费观看网站大全|