Share Email Print

Proceedings Paper

Blind extraction and security analysis of spread spectrum hidden watermarks
Author(s): John A. Marsh; Gerard F. Wohlrab
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

In the area of covert network communications, the focus has been on spread spectrum (SS) techniques using correlated host data, applicable to many data hiding and covert communications applications. Our work relates to the Iterative Generalized Least Squares (IGLS) blind signature recovery algorithm of Gkizeli et al. 1, and can be summarized as follows: (1) We have performed extensive Monte Carlo simulations that characterize the convergence properties of the algorithm as a function of signature length, host distortion, and number of hidden bits; (2) We have developed and characterized the behavior of a fully blind extension of the IGLS algorithm, called the BC-IGLS (Blind IGLS using Clustering); (3) We have developed and performed a characterization study of an extension to the IGLS algorithm, called the MS-IGLS (Multi Signature IGLS), that performs blind extraction of multiple signatures in multi-user embedding applications2.

Paper Details

Date Published: 8 May 2012
PDF: 14 pages
Proc. SPIE 8408, Cyber Sensing 2012, 84080W (8 May 2012); doi: 10.1117/12.920768
Show Author Affiliations
John A. Marsh, SUNY Institute of Technology (United States)
Assured Information Security, Inc. (United States)
Gerard F. Wohlrab, Air Force Research Lab. (United States)

Published in SPIE Proceedings Vol. 8408:
Cyber Sensing 2012
Igor V. Ternovskiy; Peter Chin, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?