Hu Yun, Niu Xin-xin, Yang Yi-xian. The Study on the Capacity of Information Hiding System on Still Images[J]. Journal of Electronics & Information Technology, 2004, 26(11): 1681-1685.
Citation:
Hu Yun, Niu Xin-xin, Yang Yi-xian. The Study on the Capacity of Information Hiding System on Still Images[J]. Journal of Electronics & Information Technology, 2004, 26(11): 1681-1685.
Hu Yun, Niu Xin-xin, Yang Yi-xian. The Study on the Capacity of Information Hiding System on Still Images[J]. Journal of Electronics & Information Technology, 2004, 26(11): 1681-1685.
Citation:
Hu Yun, Niu Xin-xin, Yang Yi-xian. The Study on the Capacity of Information Hiding System on Still Images[J]. Journal of Electronics & Information Technology, 2004, 26(11): 1681-1685.
To evaluate and calculate the capacity of information hiding system is a crucial topic of the field. From the point of view of the coding theory and set theory, this paper suggest a methodology for calculating the capacity of information hiding system on still images in a discrete case, meantime, some definitions are given and a conclusion that the capacity in the condition of no attackers is only related to the distortion function and the PMF(Probability Mass Function) of the source data is drawn out. Furthermore, the results of the capacity of information hiding in the case with attackers are given also.
Barmi M, Bartolini F, et al.. Capacity of full frame DCT image watermarks[J]. IEEE Trans. on Image Processing, 2000, IP-9(8): 1450-1455.[2]Cohen A S, Lapidoth A. The capacity of the vector Gaussian watermarking game[C]. ISIT2001,Washington, DC, June 2001: 24-29.[3]Moulin P, OSullivan J A. Information-theoretic analysis of information hiding[J]. IEEE Trans.on Information Theory, 2003, IT-49(3): 563-593.[4]OSullivan J A, Moulin P, et al.. Information theoretic analysis of steganography[C]. ISIT 1998,Cambridge, MA, USA, August 1998: 16-21.