Evolutionary hidden information detection by granulation-based fitness approximation

Spread spectrum watermarking (SSW) is one of the most powerful techniques for secure audio or image watermarking. SSW hides information by spreading the spectrum. The hidden information is called the 'watermark' and is added to a host signal, making the latter a watermarked signal. The spreading of the spectrum is carried out by using a pseudorandom noise (PN) sequence. In conventional SSW approaches, the receiver must know both the PN sequence used at the transmitter and the location of the watermark in the watermarked signal for detecting the hidden information. This method has contributed much to secure audio watermarking in that any user, who is not able to access this secrete information, cannot detect the hidden information. Detection of the PN sequence is the key issue of hidden information detection in SSW. Although the PN sequence can be reliably detected by means of heuristic approaches, due to the high computational cost of this task, such approaches tend to be too computationally expensive to be practical. Evolutionary Algorithms (EAs) belong to a class of such approaches. Most of the computational complexity involved in the use of EAs arises from fitness function evaluation that may be either very difficult to define or computationally very expensive to evaluate. This paper proposes an approximate model, called Adaptive Fuzzy Fitness Granulation with Fuzzy Supervisor (AFFG-FS), to replace the expensive fitness function evaluation. First, an intelligent guided technique via an adaptive fuzzy similarity analysis for fitness granulation is used for deciding on the use of exact fitness function and dynamically adapting the predicted model. Next, in order to avoid manually tuning parameters, a fuzzy supervisor as auto-tuning algorithm is employed. Its effectiveness is investigated with three traditional optimization benchmarks of four different choices for the dimensionality of the search space. The effect of the number of granules on the rate of convergence is also studied. The proposed method is then extended to the hidden information detection problem to recover a PN sequence with a chip period equal to 63, 127 and 255 bits. In comparison with the standard application of EAs, experimental analysis confirms that the proposed approach has an ability to considerably reduce the computational complexity of the detection problem without compromising performance. Furthermore, the auto-tuning of the fuzzy supervisor removes the need of exact parameter determination.

[1]  Kaliappan Gopalan Audio steganography using bit modification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[2]  R. Brereton,et al.  Support vector machines for classification and regression. , 2010, The Analyst.

[3]  Carlos A. Coello Coello,et al.  Auto-tuning fuzzy granulation for evolutionary optimization , 2008, 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence).

[4]  Darko Kirovski,et al.  Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..

[5]  Mehrdad Salami,et al.  The Fast Evaluation Strategy for Evolvable Hardware , 2005, Genetic Programming and Evolvable Machines.

[6]  Min-Jea Tahk,et al.  Acceleration of the convergence speed of evolutionary algorithms using multi-layer neural networks , 2003 .

[7]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[8]  Bernard De Baets,et al.  Is Fitness Inheritance Useful for Real-World Applications? , 2003, EMO.

[9]  Hyoung Joong Kim,et al.  A novel echo-hiding scheme with backward and forward kernels , 2003, IEEE Trans. Circuits Syst. Video Technol..

[10]  Carlos A. Coello Coello,et al.  A study of fitness inheritance and approximation techniques for multi-objective particle swarm optimization , 2005, 2005 IEEE Congress on Evolutionary Computation.

[11]  Nedeljko Cvejic,et al.  ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY , 2004 .

[12]  T. Ray,et al.  A framework for design optimization using surrogates , 2005 .

[13]  Carlos A. Coello Coello,et al.  Dynamic fitness inheritance proportion for multi-objective particle swarm optimization , 2006, GECCO.

[14]  Mehrdad Salami,et al.  A fast evaluation strategy for evolutionary algorithms , 2003, Appl. Soft Comput..

[15]  Lawrence Davis,et al.  Genetic Algorithms and Simulated Annealing , 1987 .

[16]  Majid Bahrepour,et al.  Detecting Hidden Information from Watermarked Signal using Granulation Based Fitness Approximation , 2009 .

[17]  André I. Khuri,et al.  Response surface methodology , 2010, International Encyclopedia of Statistical Science.

[18]  Naser Pariz,et al.  Adaptive fuzzy fitness granulation for evolutionary optimization , 2008, Int. J. Approx. Reason..

[19]  P. K. Chaturvedi,et al.  Communication Systems , 2002, IFIP — The International Federation for Information Processing.

[20]  Zbigniew Michalewicz,et al.  Evolutionary Computation 1 , 2018 .

[21]  Morteza Khademi,et al.  Detecting Hidden Information from a Spread Spectrum Watermarked Signal by Genetic Algorithm , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[22]  Rashid Ansari,et al.  Data-hiding in audio using frequency-selective phase alteration , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[23]  Rajarathnam Chandramouli,et al.  Secret key estimation in sequential steganography , 2005, IEEE Transactions on Signal Processing.

[24]  Lajos Hanzo,et al.  Genetic algorithm assisted joint multiuser symbol detection and fading channel estimation for synchronous CDMA systems , 2001, IEEE J. Sel. Areas Commun..

[25]  Bernhard Sendhoff,et al.  Structure optimization of neural networks for evolutionary design optimization , 2005, Soft Comput..

[26]  Mehrdad Ardebilipour,et al.  Spread Spectrum Code Estimation by Genetic Algorithm , 2007 .

[27]  David E. Goldberg,et al.  Fitness Inheritance In Multi-objective Optimization , 2002, GECCO.

[28]  O. A. Elwakeil,et al.  Global optimization methods for engineering applications: A review , 1995 .

[29]  Naser Pariz,et al.  A novel general framework for evolutionary optimization: Adaptive fuzzy fitness granulation , 2007, 2007 IEEE Congress on Evolutionary Computation.

[30]  Vijay K. Rohatgi,et al.  Advances in Fuzzy Set Theory and Applications , 1980 .

[31]  Lotfi A. Zadeh,et al.  Fuzzy sets and information granularity , 1996 .

[32]  David H. Ackley,et al.  An empirical study of bit vector function optimization , 1987 .

[33]  Harinder P. Singh,et al.  Fuzzy Sets and Information , 2010 .

[34]  Thomas Bäck,et al.  An Overview of Evolutionary Algorithms for Parameter Optimization , 1993, Evolutionary Computation.

[35]  Jeffrey Horn,et al.  Handbook of evolutionary computation , 1997 .

[36]  Douglas C. Montgomery,et al.  Response Surface Methodology: Process and Product Optimization Using Designed Experiments , 1995 .