Share Email Print
cover

Proceedings Paper

Joint data hiding and source coding with partially available side information
Author(s): Çağatay Dikici; Khalid Idrissi; Atilla Baskurt
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Channel Coding with Side Information at the encoder(CCSI) can be visualized as a blind watermarking problem: the original host signal for embedding the watermark is known at the encoder but not at the decoder. Similarly, the Rate Distortion with Side Information at the decoder(RDSI) is known as distributed source coding: the rate distortion limits of an input source if a noisy observation of that source is available only at the decoder. There is a strong duality between CCSI and RDSI for the gaussian case. We propose a system that exploits the generalized versions of the two information theoretical dualities of CCSI and RDSI together within a unique setup. The question is "Can we combine these two separated dual problems (blind watermarking and distributed source coding) within a single problem?". The proposed scheme can be viewed as "Watermarking or Data Hiding within Distributed Source Coding". The setup contains the cascade of the generalized versions of CCSI and RDSI where there exists two different side information, one available only at the encoder and the other at the decoder. The preliminary experimental results are given using the theoretical findings of the duality problem.

Paper Details

Date Published: 17 February 2006
PDF: 7 pages
Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 60721E (17 February 2006); doi: 10.1117/12.643005
Show Author Affiliations
Çağatay Dikici, INSA de Lyon, LIRIS, UMR 5205, CNRS (France)
Khalid Idrissi, INSA de Lyon, LIRIS, UMR 5205, CNRS (France)
Atilla Baskurt, INSA de Lyon, LIRIS, UMR 5205, CNRS (France)


Published in SPIE Proceedings Vol. 6072:
Security, Steganography, and Watermarking of Multimedia Contents VIII
Edward J. Delp III; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top