Detecting Hidden Information from Watermarked Signal using Granulation Based Fitness Approximation

Spread spectrum audio watermarking (SSW) is one of the most secure techniques of audio watermarking. SSW hides information by spreading their spectrum which is called watermark and adds it to a host signal as a watermarked signal. Spreading spectrum is done by a pseudonoise (PN) sequence. In conventional SSW approaches, the receiver must know the PN sequence used at the transmitter as well as the location of the watermark in watermarked signal for detecting hidden information. This method is attributed high security features, since any unauthorized user who does not access this information cannot detect any hidden information. Detection of the PN sequence is the key factor for detection of hidden information from SSW. Although PN sequence detection is possible by using heuristic approaches such as evolutionary algorithms, due to the high computational cost of this task, such heuristic tends to become too expensive (computationally speaking), which can turn it impractical. Much of the computational complexity involved in the use of evolutionary algorithms as an optimization tool is due to the fitness function evaluation that may either be very difficult to define or be computationally very expensive. This paper proposes the use of fitness granulation to recover a PN sequence with a chip period equal to 63, 127, 255 bits. This is a new application of authors’ earlier work on adaptive fitness function approximation with fuzzy supervisory. With the proposed approach, the expensive fitness evaluation step is replaced by an approximate model. The approach is then compared with standard application of evolutionary algorithms; statistical analysis confirms that the proposed approach demonstrates an ability to reduce the computational complexity of the design problem without sacrificing performance.

[1]  Min-Jea Tahk,et al.  Acceleration of the convergence speed of evolutionary algorithms using multi-layer neural networks , 2003 .

[2]  Hyoung Joong Kim,et al.  A novel echo-hiding scheme with backward and forward kernels , 2003, IEEE Trans. Circuits Syst. Video Technol..

[3]  Kaliappan Gopalan,et al.  Audio Steganography Using Bit Modification - A Tradeoff on Perceptibility and Data Robustness for Large Payload Audio Embedding , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.

[4]  Darko Kirovski,et al.  Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..

[5]  T. Ray,et al.  A framework for design optimization using surrogates , 2005 .

[6]  Simon Haykin,et al.  Communication Systems , 1978 .

[7]  Lajos Hanzo,et al.  Genetic algorithm assisted joint multiuser symbol detection and fading channel estimation for synchronous CDMA systems , 2001, IEEE J. Sel. Areas Commun..

[8]  Naser Pariz,et al.  A novel general framework for evolutionary optimization: Adaptive fuzzy fitness granulation , 2007, 2007 IEEE Congress on Evolutionary Computation.

[9]  Nedeljko Cvejic,et al.  ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY , 2004 .

[10]  Mehrdad Salami,et al.  The Fast Evaluation Strategy for Evolvable Hardware , 2005, Genetic Programming and Evolvable Machines.

[11]  S. Gunn Support Vector Machines for Classification and Regression , 1998 .

[12]  Rashid Ansari,et al.  Data-hiding in audio using frequency-selective phase alteration , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[13]  Mehrdad Ardebilipour,et al.  Spread Spectrum Code Estimation by Genetic Algorithm , 2007 .

[14]  Carlos A. Coello Coello,et al.  Dynamic fitness inheritance proportion for multi-objective particle swarm optimization , 2006, GECCO.

[15]  O. A. Elwakeil,et al.  Global optimization methods for engineering applications: A review , 1995 .

[16]  Zengo Furukawa,et al.  A General Framework for , 1991 .

[17]  David E. Goldberg,et al.  Fitness Inheritance In Multi-objective Optimization , 2002, GECCO.

[18]  R. H. Myers,et al.  Response Surface Methodology: Process and Product Optimization Using Designed Experiments , 1995 .

[19]  Zheng Liu,et al.  Robust audio watermark method using sinusoid patterns based on pseudo-random sequences , 2003, IS&T/SPIE Electronic Imaging.

[20]  R. Chandramouli,et al.  Secret key estimation in sequential steganography , 2005 .

[21]  Morteza Khademi,et al.  Detecting Hidden Information from a Spread Spectrum Watermarked Signal by Genetic Algorithm , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[22]  Carlos A. Coello Coello,et al.  Auto-tuning fuzzy granulation for evolutionary optimization , 2008, 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence).