• Ei tuloksia

A New Scalar Quantization Method for Digital Image Watermarking

N/A
N/A
Info
Lataa
Protected

Academic year: 2022

Jaa "A New Scalar Quantization Method for Digital Image Watermarking"

Copied!
17
0
0

Kokoteksti

(1)

This document has been downloaded from

TamPub โ€“ The Institutional Repository of University of Tampere

Publisher's version

The permanent address of the publication is http://urn.fi/URN:NBN:fi:uta-201603161319

Author(s): Zolotavkin, Yevhen; Juhola, Martti

Title: A New Scalar Quantization Method for Digital Image Watermarking

Year: 2016

Journal Title: Journal of Electrical and Computer Engineering

Pages: 1-13

ISSN: 2090-0147

Discipline: Mathematics; Computer and information sciences;

Electronic, automation and communications engineering, electronics

School /Other Unit: School of Information Sciences Item Type: Journal Article

Language: en

DOI: http://dx.doi.org/10.1155/2016/9029745

URN: URN:NBN:fi:uta-201603161319

Additional Information: Artikkelinumero: 9029745

All material supplied via TamPub is protected by copyright and other intellectual

property rights, and duplication or sale of all part of any of the repository collections

is not permitted, except that material may be duplicated by you for your research use

or educational purposes in electronic or print form. You must obtain permission for

any other use. Electronic or print copies may not be offered, whether for sale or

otherwise to anyone who is not an authorized user.

(2)

Research Article

A New Scalar Quantization Method for Digital Image Watermarking

Yevhen Zolotavkin and Martti Juhola

Computer Science, School of Information Sciences, University of Tampere, Kanslerinrinne 1, 33014 Tampere, Finland

Correspondence should be addressed to Yevhen Zolotavkin; zhzolot@countermail.com Received 7 October 2015; Revised 18 January 2016; Accepted 24 January 2016

Academic Editor: Mazdak Zamani

Copyright ยฉ 2016 Y. Zolotavkin and M. Juhola. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

A new technique utilizing Scalar Quantization is designed in this paper in order to be used for Digital Image Watermarking (DIW).

Efficiency of the technique is measured in terms of distortions of the original image and robustness under different kinds of attacks, with particular focus on Additive White Gaussian Noise (AWGN) and Gain Attack (GA). The proposed technique performance is affirmed by comparing with state-of-the-art methods including Quantization Index Modulation (QIM), Distortion Compensated QIM (DC-QIM), and Rational Dither Modulation (RDM). Considerable improvements demonstrated by the method are due to a new form of distribution of quantized samples and a procedure that recovers a watermark after GA. In contrast to other known quantization methods, the detailed method here stipulates asymmetric distribution of quantized samples. This creates a distinctive feature and is expressed numerically by one of the proposed criteria. In addition, several realizations of quantization are considered and explained using a concept of Initial Data Loss (IDL) which helps to reduce watermarking distortions. The procedure for GA recovery exploits one of the two criteria of asymmetry. The accomplishments of the procedure are due to its simplicity, computational lightness, and sufficient precision of estimation of unknown gain factor.

1. Introduction

In modern communications, multimedia plays significant role. Ownership of multimedia data is important and needs to be protected [1]. As a part of nowadays popular multimedia content, digital images are an important class. A protection of digital rights of an owner is implemented by Digital Image Watermarking (DIW). A watermark that is inserted into an image has to be robust [2] as well as invisible [3].

Among the popular and efficient techniques in DIW, Quantization Index Modulation (QIM) is widely used in blind watermarking where neither original media nor water- mark is known to the receiver [4, 5]. One of the aspects of robustness of QIM is evaluated by attacking a watermarked image with Additive White Gaussian Noise (AWGN). Unfor- tunately, all the known on practice implementations of QIM are far from achieving the channel capacity limit that was first derived in [6].

Several different QIM-related approaches are known.

Some state-of-the-art realizations will be outlined briefly.

According to QIM, intervals of equal lengthฮ”are mapped

on the real number line. The oldest known approach is to replace all the original coefficients inside every interval with one of the two endpoints of that interval. The selection of the endpoint depends on a bit of a watermark [7]. The main disadvantage is that for high intensity of noise and the capacity of the oldest QIM is much lower than the theoretical limit. In a more advanced realization of DC-QIM, coefficients from every original interval are mapped into two disjoint subintervals. The gap between the subintervals is controlled by parameter๐›ผ,0 โ‰ค ๐›ผ โ‰ค 1[8]. Assuming that initial dis- tribution inside original interval and target distributions in subintervals are uniform, the mapping in accordance to DC- QIM is optimal in terms of Mean Square Error (MSE) of quantization. In order to maximize capacity for a given MSE under AWGN of different intensity, parametersฮ”,๐›ผhave to be adjusted. Nevertheless, the limit defined in [6] is still well above the one achievable by DC-QIM.

Not all the original coefficients in each interval need to be quantized. This idea has been explored by the authors of Forbidden Zone Data Hiding (FZDH) [9]. Another idea was proposed by the authors of Thresholded Constellation

Volume 2016, Article ID 9029745, 16 pages http://dx.doi.org/10.1155/2016/9029745

(3)

Modulation (TCM) that uses two different quantization rules to modify coefficients inside the original interval [10].

Despite sufficient robustness of QIM under AWGN, the limitation is that synchronization is required in order to reconstruct intervals that are necessary to extract (or decode) a watermark. A type of distortion which scales all the watermarked coefficients is called Gain Attack (GA).

The scaling factor might be close to 1 and cause very little visual distortion, but it is unknown to the receiver which causes asynchronous extraction. Retrieval of the watermark is usually complicated by AWGN that follows GA [11].

Improvement of QIM performance under GA is the task of numerous known approaches [12]. Most of them can be classified into two groups where the main idea of the first group is to estimate the unknown factor [13] while the idea of the second is to quantize coefficients of a different kind that are invariant to scaling of original signal.

The solution proposed in [11] contributes to robustness enhancement in case of GA and a constant offset attack followed by AWGN. A pilot signal is embedded for this pur- pose. Fourier analysis is used during extraction to estimate the gain factor and the offset. Another method of recovery after GA and AWGN is proposed in [14]. It uses information about dither sequence and applies Maximum Likelihood (ML) procedure to estimate the scaling factor.

Watermarking that is invariant to GA demands more complex transform of original signal (e.g., nonlinear) to obtain coefficients. One of the most popular watermarking methods in that category is Rational Dither Modulation (RDM) [15]. For a particular coefficient, a ratio that depends on a norm of other coefficients is being quantized instead of a coefficient itself. In order to quantize the ratio, RDM utilizes the simplest QIM scheme. This implies that the performance of RDM under AWGN (without GA) is close to the simplest QIM. Among others recent blind watermarking methods robust to GA are, for example, detailed in [16โ€“18].

A new scalar QIM-based watermarking method is pro- posed in this paper. It provides high robustness under conditions of AWGN and GA. Among the new features of the method are IDL and a new form of distribution of quantized samples.

The organization of the rest of the paper is as follows.

Section 2 explains the choice of the distribution of quan- tized samples and contains description of the procedure of recovery after GA. Concept of IDL and quantization model are described in Section 3 using formal logic approach. The aspects of analytic-based estimation of robustness under AWGN are discussed in Section 4. Next, Section 5 contains experimental results obtained under AWGN and GA. Dis- cussion of the details of the experiment and comparison of the performance are given in Section 6. Section 7 concludes the paper. The list of the key variables and their meaning is given in Nomenclature section.

2. Distribution of Quantized Samples and Procedure for Recovery after GA

An asymmetric distribution of quantized samples is proposed and parametrized in this section. Asymmetry is the quality

that can be easily expressed quantitatively. Under symmetric attack, like AWGN, such quantitative index remains suffi- ciently indicative. On the other hand, it can be affected by GA. Such semifragility is favorable for restoration of the right condition for decoding. The restoration is done by the procedure for recovery after GA which uses criterion of asymmetry. Compared to the known estimation procedures [14], the one proposed in this section depends on a single variable which is the unknown gain factor. This makes the technique simple and more precise.

For encoding, in our case, asymmetric distribution re- quires substantially more variables for description compared to common QIM methods. Because of that, it is advisable to refer to Nomenclature section.

2.1. Distribution of Quantized Samples. Symbolฮฃwill be used to denote a random variable whose domain is the space of original coefficients of a host. A particular realization ofฮฃ will be denoted as๐œ. We will further consider manipulation of original values๐œ that are in some๐‘˜th interval of sizeฮ” and its left endpoint is๐‘™ฮ”๐‘˜. Such an interval is referred further as embedding interval. For any๐œ โˆˆ [๐‘™๐‘˜ฮ”, ๐‘™๐‘˜ฮ” + ฮ”]we define ๐‘ฅ = ๐œ โˆ’ ๐‘™ฮ”๐‘˜ and๐‘‹will be used to denote a random variable which represents๐‘ฅ. The value ofฮ”should be small enough so that the distribution of๐‘‹can be considered uniform. A random variable that represents quantized coefficients inside ๐‘˜th interval is denoted as๐‘‹๓ธ€ and its realization is denoted as ๐‘ฅ๓ธ€ . Each pair of an original๐‘ฅand corresponding quantized ๐‘ฅ๓ธ€  belongs to the same๐‘˜th embedding interval so that an absolute shift is never larger than ฮ”. Correspondingly, a random variable that represents quantized coefficients on the whole real number line is denoted asฮฃ๓ธ€ and its realization is denoted as๐œ๓ธ€ .

In order to provide efficient recovery after GA, we propose the following asymmetric distribution of quantized samples๐‘ฅ๓ธ€ inside๐‘˜th embedding interval (Figure 1(a)):

๐‘“ (๐‘ฅ๓ธ€ ) = {{ {{ {{ {{ {

(๐›พ0+ ๐œ‚1) ๐‘“0(๐‘ฅ๓ธ€ ) , if๐‘ฅ๓ธ€ โˆˆ [0, ฮ” (๐›ฝ โˆ’ ๐›ผ)] , (๐œ‘1+ ๐œ—0) ๐‘“1(๐‘ฅ๓ธ€ ) , if๐‘ฅ๓ธ€ โˆˆ [ฮ”๐›ฝ, ฮ”] ,

0, otherwise,

(1)

where๐‘“0(๐‘ฅ๓ธ€ )and๐‘“1(๐‘ฅ๓ธ€ )are two different kinds of truncated distributions defined as

๐‘“0(๐‘ฅ๓ธ€ ) ={ {{

๐‘๐‘ฅ๓ธ€ + ๐œ, if ๐‘ฅ๓ธ€ โˆˆ [0, ฮ” (๐›ฝ โˆ’ ๐›ผ)] ,

0, otherwise, (2)

๐‘“1(๐‘ฅ๓ธ€ ) ={ {{

๐‘”, if ๐‘ฅ๓ธ€ โˆˆ [ฮ”๐›ฝ, ฮ”] ,

0, otherwise. (3)

The other parameters are constrained in the following way:

0 โ‰ค ๐›ผ โ‰ค ๐›ฝ โ‰ค 1, ๐›พ0 + ๐œ—0 + ๐œ‘1 + ๐œ‚1 = 1 (see Nomenclature section). The meaning of parameters๐›พ0,๐œ—0,๐œ‘1, ๐œ‚1will be discussed later in Section 3. In Figure 1(b) we can see the distribution of the quantized coefficients outside๐‘˜th embedding interval as well.

(4)

x๓ณฐ€ f0(x๓ณฐ€)

f1(x๓ณฐ€) ๐›ผฮ”

๐›ฝฮ” ฮ”

โ€œ1โ€ ๐œ

lฮ”k lฮ”k+ ฮ” ๐œ๓ณฐ€

โ€œ0โ€

(a)

๐œ๓ณฐ€

โ€œ0โ€

โ€œ1โ€

โ€œ0โ€

โ€œ1โ€

โ€œ0โ€

โ€œ1โ€ Th Th

k โˆ’ 1 k k + 1 k + 2 k + 3

(b)

Figure 1: Distribution of the quantized coefficients: (a) Inside๐‘˜th embedding interval. (b) In five consecutive intervals.

2.2. Procedure for GA Recovery. It is assumed that under GA the original length of embedding interval ฮ” is altered by unknown gain factor๐œ†and the resulting length isฬƒฮ” = ๐œ†ฮ”.

In addition to that, AWGN attack is applied. The procedure for GA recovery is the estimator whose result is based on a criterion having higher values for the right length ฬƒฮ” of embedding interval. The uniqueness of the distribution of quantized samples is exploited by two different criteria ๐ถ1 and ๐ถ2. The procedure itself represents a brute force approach that substitutes guessed values ฬƒฮ”๓ธ€  of the length of embedding interval into a criterion. Guessed value of ฬƒฮ”๓ธ€  which maximizes it (๐ถ1or๐ถ2) should be selected:

ฬƒฮ”๓ธ€ ๓ธ€ =arg max

{ฬƒฮ”๓ธ€ } ๐ถ1,2(ฬƒฮ”๓ธ€ ) , (4) whereฬƒฮ”๓ธ€ ๓ธ€ is the final output of the procedure. Some interval [ฬƒฮ”๓ธ€ min, ฬƒฮ”๓ธ€ max] for guessed values ฬƒฮ”๓ธ€  should be defined in advance. For instance,ฬƒฮ”๓ธ€ min = 0.9ฮ”and ฬƒฮ”๓ธ€ max = 1.1ฮ”works well in most cases because the diapason of scaling factor๐œ†is quite limited on practice.

For each particular valueฬƒฮ”๓ธ€ , the index defined according to the criterion is calculated by projecting noisy quantized samples๐œ๐‘›๓ธ€ on a single embedding interval:

๐‘ฅ๓ธ€ ๐‘›

= {{ {{ {{ {{ {

๐œ๐‘›๓ธ€ mod ฬƒฮ”๓ธ€ , if [[ [ [

๐œ๓ธ€ ๐‘›โˆ’ ๐‘™๐‘˜ฮ”

ฬƒฮ”๓ธ€  ]] ] ]

mod2 = 0,

ฬƒฮ”๓ธ€ โˆ’ (๐œ๐‘›๓ธ€  modฬƒฮ”๓ธ€ ) , otherwise.

(5)

This is needed to reconstruct the distribution of quantized samples inside embedding interval.

Two criteria are proposed for the assessment of the distribution of random variable๐‘‹๓ธ€ ๐‘› โˆˆ [0, ฬƒฮ”๓ธ€ ](subscript โ€œ๐‘›โ€

means affected by noise):

๐ถ1(ฬƒฮ”๓ธ€ ) =๓ต„จ๓ต„จ๓ต„จ๓ต„จ

๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ

median(๐‘‹๓ธ€ ๐‘›)

ฬƒฮ”๓ธ€  โˆ’ 0.5๓ต„จ๓ต„จ๓ต„จ๓ต„จ

๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ, ๐ถ2(ฬƒฮ”๓ธ€ ) =๓ต„จ๓ต„จ๓ต„จ๓ต„จ

๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ

๓ต„จ

๐œ‡๐‘ค(๐‘‹๓ธ€ ๐‘›) (ฬƒฮ”๓ธ€ )๐‘ค

๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ

๓ต„จ๓ต„จ๓ต„จ๓ต„จ๓ต„จ

, ๐‘ค = 2๐‘š + 1, ๐‘š โˆˆN.

(6)

Here, ๐œ‡๐‘ค is the ๐‘คth central moment. Odd moments are zero for symmetric distributions, but for asymmetric distributions their values can be sufficiently large. If the assumption aboutฬƒฮ”is wrong, then the values of both criteria are low. In that case the distribution of๐‘‹๓ธ€ ๐‘› is very close to uniform (which is symmetric). This is because of the effect caused by GA on calculation of๐‘ฅ๓ธ€ ๐‘›in (5). Nevertheless, the distribution of๐‘‹๓ธ€ ๐‘›demonstrates asymmetry in caseฬƒฮ”๓ธ€ is close to ฬƒฮ”. The explanation is that the distribution of quantized samples inside embedding interval (before GA is introduced) is indeed asymmetric. In spite of utilization of brute force optimization, the procedure is simple and the computational demand is low. On practice, the number of brute force steps is much smaller than the number of quantized elements.

Therefore, the complexity is๐‘‚(๐‘›)in that case. For instance, for recovery with high accuracy it is enough to perform 103 brute force steps with values from the interval[ฬƒฮ”๓ธ€ min, ฬƒฮ”๓ธ€ max].

3. Quantization

A quantization model is introduced in this section. In order to represent it in a compact form, we combine all the quantization conditions in a single logical expression.

Previously proposed distribution of quantized samples is assured. However, additional parameter of the quantization model implies different distribution of the samples associated with labels โ€œ0โ€ and โ€œ1.โ€

3.1. Two Approaches for Quantization. Quantized samples are modified according to the model described in this subsection.

A watermark bit is denoted as๐‘. Each sample with value๐‘ฅ inside๐‘˜th embedding interval has index๐‘– โˆˆ N according to its order in the host sequence. During watermarking a bit is assigned to each index๐‘–. Different frameworks might be used for description of the quantization model. We will use first order predicate logic to describe our approach. This choice can be reasoned as follows. A closed-from expression has to be defined for quantization and it is important to show that the derived solution minimizes MSE between initial and target distribution. The kind of proposed target distribution is not common for QIM-based watermarking methods. Therefore, we find it necessary to explain in detail the process of derivation of quantization expression. Also, samples interpreting โ€œ0โ€ should be quantized in a different way to samples interpreting โ€œ1.โ€ Predicate logic is a suitable

(5)

lฮ”k+ L1 lฮ”k+ L2

lkฮ” lฮ”k+ ฮ”

๐œ ๐œ‘1+ ๐œ‚1

ฮ” 1

ฮ”

๐›พ0+ ๐œ—0

ฮ” NIDL0

NIDL1 IDL1

IDL0

Figure 2: Scheme of labeling and distribution of original samples prior to quantization.

tool for description of embedding because logical construc- tion can incorporate all the possible quantization conditions in a compact form.

Two-place predicate ๐ธ is to denote correspondence between some index and the value of coefficient. For example, ๐ธ๐‘–๐‘ฅis true if a coefficient with order๐‘–has value๐‘ฅ. We will further use notation of the setE which contains all the pairs (๐‘ฅ, ๐‘–)that provide true value of๐ธ๐‘–๐‘ฅ. One-place predicate๐ตis to denote bit value assigned to a coefficient with particular index. For instance, ๐ต๐‘– is true if watermark bit๐‘ = 1 is assigned to a coefficient with index๐‘–andโˆผ ๐ต๐‘–is true if๐‘ = 0.

Two-place predicates๐‘‹0 or๐‘‹1 will be used to define that some๐‘–th sample with value๐‘ฅhas label โ€œ0โ€ or โ€œ1,โ€ respectively:

(๐‘‹0๐‘–๐‘ฅ โ‰ก (๐ธ๐‘–๐‘ฅ&โˆผ ๐ต๐‘–)) , (โˆ€๐‘–) (โˆ€๐‘ฅ) , (7) (๐‘‹1๐‘–๐‘ฅ โ‰ก (๐ธ๐‘–๐‘ฅ&๐ต๐‘–)) , (โˆ€๐‘–) (โˆ€๐‘ฅ) . (8) SetsX0 and X1 contain all the pairs(๐‘ฅ, ๐‘–) that provide true values of๐‘‹0๐‘–๐‘ฅand๐‘‹1๐‘–๐‘ฅ, respectively. Initial PDFs of๐‘‹ insideX0,X1, andE are considered to be uniform:๐‘“X0(๐‘ฅ) = ๐‘“X1(๐‘ฅ) = ๐‘“E(๐‘ฅ) = 1/ฮ”(Figure 2).

Also, each coefficient is labeled either as IDL or non- IDL depending on its value๐‘ฅand index๐‘–. Samples labeled as IDL are quantized in a different way which reduces the total embedding distortion. Both types of coefficients (IDL and non-IDL) are being modified during quantization.

However, after quantization, interpretation of a bit of each IDL coefficient is incorrect. The purpose of quantization is to provide that all the non-IDL samples can be extracted correctly and the resulting distribution of all the samples is the one depicted in Figure 1(a). Parameters ๐œ‚1 and ๐œ—0 represent fractions of IDL for๐‘ = 1and๐‘ = 0, respectively.

Parameters๐œ‘1and๐›พ0represent fractions of non-IDL samples for๐‘ = 1and๐‘ = 0, respectively. The fraction of zeros in a watermark data is๐›พ0+ ๐œ—0and fraction of ones is๐œ‘1+ ๐œ‚1. It is required that๐›พ0+ ๐œ—0+ ๐œ‘1+ ๐œ‚1= 1.

We define IDL and non-IDL samples using two-place predicates IDL0, IDL1, NIDL0, and NIDL1 in the following way (Figure 2):

(IDL0๐‘–๐‘ฅ โ‰ก (๐‘‹0๐‘–๐‘ฅ&(๐‘ฅ > ๐ฟ1))) , (โˆ€๐‘–) (โˆ€๐‘ฅ) , (IDL1๐‘–๐‘ฅ โ‰ก (๐‘‹1๐‘–๐‘ฅ&(๐‘ฅ < ๐ฟ2))) , (โˆ€๐‘–) (โˆ€๐‘ฅ) , (NIDL0๐‘–๐‘ฅ โ‰ก (๐‘‹0๐‘–๐‘ฅ&(๐‘ฅ โ‰ค ๐ฟ1))) , (โˆ€๐‘–) (โˆ€๐‘ฅ) , (NIDL1๐‘–๐‘ฅ โ‰ก (๐‘‹1๐‘–๐‘ฅ&(๐‘ฅ โ‰ฅ ๐ฟ2))) , (โˆ€๐‘–) (โˆ€๐‘ฅ) ,

(9)

where๐ฟ1= ฮ”๐›พ0/(๐›พ0+ ๐œ—0),๐ฟ2= ฮ”๐œ‚1/(๐œ‘1+ ๐œ‚1), and๐ฟ1โ‰ฅ ๐ฟ2.

SetsIDL0,IDL1,NIDL0, andNIDL1will be used in order to specify all the coefficients that satisfy IDL0, IDL1, NIDL0, and NIDL1, respectively. Fractions๐›พ0,๐œ—0,๐œ‘1, and๐œ‚1 can be expressed in terms of cardinalities of setsIDL0,IDL1,NIDL0, NIDL1, and E. For example,|IDL0|/|E| = ๐œ—0.

In this paper, two different quantization techniques are proposed. Since predicate logic is used to describe watermark embedding, a suitable logical construction should be able to distinguish between the techniques. According to our model, each kind of quantization can be represented by setting a corresponding logical value (โ€œ0โ€ or โ€œ1โ€) for zero-place predicateฮฉ. Hence,ฮฉis used to define one out of two possible quantization techniques. For each kind of quantization,E is split on two subsetsE0andE1. For two-place predicates๐ธ0 and๐ธ1formulas๐ธ0๐‘–๐‘ฅand๐ธ1๐‘–๐‘ฅare defined in the following way:

(๐ธ0๐‘–๐‘ฅ

โ‰ก (NIDL0๐‘–๐‘ฅ โˆจ (IDL1๐‘–๐‘ฅ&ฮฉ) โˆจ (IDL0๐‘–๐‘ฅ&โˆผ ฮฉ))) , (โˆ€๐‘–) (โˆ€๐‘ฅ) ,

(10)

(๐ธ1๐‘–๐‘ฅ โ‰ก (๐ธ๐‘–๐‘ฅ&โˆผ ๐ธ0๐‘–๐‘ฅ)) , (โˆ€๐‘–) (โˆ€๐‘ฅ) . (11) Using information about distribution insideIDL0,IDL1, NIDL0, andNIDL1 it is easy to derive distribution inside E0 andE1. Let us introduce variable๐œ” โˆˆ {0, 1}of natural numbers domainN (not a logical variable) which satisfies (ฮฉ โŠƒ (๐œ” = 1))&(โˆผ ฮฉ โŠƒ (๐œ” = 0)). Common arithmetical operations can be performed with๐œ”which makes it possible to express PDF๐‘“E0(๐‘ฅ)in the following compact form:

๐‘“E0(๐‘ฅ)

= {{ {{ {{ {{ {{ {{ {{ {{ {

(๐›พ0+ ๐œ—0) ๐‘“X0(๐‘ฅ) + ๐œ” (๐œ‘1+ ๐œ‚1) ๐‘“X1(๐‘ฅ)

๐ท๐‘0 , if๐‘ฅ โ‰ค ๐ฟ2, (๐›พ0+ ๐œ—0) ๐‘“X0(๐‘ฅ)

๐ท๐‘0 , if๐ฟ2< ๐‘ฅ โ‰ค ๐ฟ1, (1 โˆ’ ๐œ”) (๐›พ0+ ๐œ—0) ๐‘“X0(๐‘ฅ)

๐ท๐‘0 , otherwise,

(12)

where๐ท๐‘0= (๐œ”๐œ‚1+ ๐›พ0+ (1 โˆ’ ๐œ”)๐œ—0).

Therefore๐‘“E1(๐‘ฅ)can be expressed as (Figures 3 and 4) ๐‘“E1(๐‘ฅ) =๐‘“E(๐‘ฅ) โˆ’ ๐ท๐‘0๐‘“E0(๐‘ฅ)

1 โˆ’ ๐ท๐‘0 . (13)

Elements of setsE0andE1are modified during quanti- zation so that new setsE๓ธ€ 0andE๓ธ€ 1are obtained, respectively.

(6)

lkฮ”

lฮ”k

lkฮ”

๐œ๓ณฐ€ ๐œ๓ณฐ€

๐œ

E๓ณฐ€0 E0

E๓ณฐ€1

E1

(๐›พ0+ ๐œ‚1)f0(x๓ณฐ€)

(๐œ‘1+ ๐œ—0)f1(x๓ณฐ€)

E0โ†’E๓ณฐ€0

E1โ†’E๓ณฐ€1

Figure 3: Scheme of redistribution of original samples during quantization,ฮฉis โ€œtrue.โ€

lkฮ”

lkฮ”

lkฮ” ๐œ๓ณฐ€

๐œ๓ณฐ€

E๓ณฐ€0 E0

E๓ณฐ€1

E1

๐œ—0f1(x๓ณฐ€) ๐œ‘1f1(x๓ณฐ€)

๐›พ0f0(x๓ณฐ€) ๐œ‚1f0(x๓ณฐ€)

E0โ†’E๓ณฐ€0

E1โ†’E๓ณฐ€1

Figure 4: Scheme of redistribution of original samples during quantization,ฮฉis โ€œfalse.โ€

Therefore, for successful quantization, we require the follow- ing formula๐น1to be true:

๐น1 โ‰ก ((๐ธ0๐‘–๐‘ฅ โŠƒ ๐ธ๓ธ€ 0๐‘–๐‘ฅ๓ธ€ )&(๐ธ1๐‘–๐‘ฅ โŠƒ ๐ธ๓ธ€ 1๐‘–๐‘ฅ๓ธ€ )) ,

(โˆ€๐‘–) (โˆ€๐‘ฅ) (โˆƒ๐‘ฅ๓ธ€ ) . (14)

As a result of quantization, variables ๐‘‹E0 and ๐‘‹E1 are modified in a way that the resulting๐‘‹๓ธ€ E๓ธ€ 

0 and ๐‘‹๓ธ€ E๓ธ€ 

1 are dis- tributed according to some desired distributions. For each kind of quantization (depending on the value ofฮฉ), the pair of desired distributions is different. We propose the following distributions that can be expressed as (Figures 3 and 4)

(7)

๐‘“E๓ธ€ 0(๐‘ฅ๓ธ€ ) = ๐œ”๐‘“0(๐‘ฅ๓ธ€ ) + (1 โˆ’ ๐œ”)๐›พ0๐‘“0(๐‘ฅ๓ธ€ ) + ๐œ—0๐‘“1(๐‘ฅ๓ธ€ ) ๐›พ0+ ๐œ—0 , ๐‘“E๓ธ€ 1(๐‘ฅ๓ธ€ ) = ๐œ”๐‘“1(๐‘ฅ๓ธ€ ) + (1 โˆ’ ๐œ”)๐œ‚1๐‘“0(๐‘ฅ๓ธ€ ) + ๐œ‘1๐‘“1(๐‘ฅ๓ธ€ ) ๐œ‘1+ ๐œ‚1 .

(15)

It can be seen that, for any logical value ofฮฉ, the distribution of๐‘‹๓ธ€ inside{E0โˆชE1}is the same and matches the distribution represented in Figure 1. It means that the efficiency of the procedure of GA recovery (proposed in the previous section) cannot be affected by the selection ofฮฉ.

In addition to the necessity of providing desired dis- tribution of the quantized samples, we need to minimize quantization distortions. Both requirements can be expressed by two two-place predicates๐‘ˆand๐‘‰:

(๐ธ๓ธ€ 0๐‘–๐‘ฅ๓ธ€ โ‰ก ๐ธ0๐‘–๐‘ฅ&๐‘ˆ๐‘ฅ๐‘ฅ๓ธ€ ) , (โˆ€๐‘–) (โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) ,

(๐ธ๓ธ€ 1๐‘–๐‘ฅ๓ธ€ โ‰ก ๐ธ1๐‘–๐‘ฅ&๐‘‰๐‘ฅ๐‘ฅ๓ธ€ ) , (โˆ€๐‘–) (โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) . (16) The idea of minimization of embedding distortions can be explained in the following example. Assuming two samples ๐‘ฅ๐‘–, ๐‘ฅ๐‘— โˆˆ E0, ๐‘ฅ๐‘– โ‰ค ๐‘ฅ๐‘—, we infer that quantization in a way in which๐‘ฅ๓ธ€ ๐‘– โ‰ค ๐‘ฅ๓ธ€ ๐‘— implies less distortion than in case when ๐‘ฅ๓ธ€ ๐‘– > ๐‘ฅ๓ธ€ ๐‘—. Let us sort elements inE0andE๓ธ€ 0in the dimension of ๐‘ฅand๐‘ฅ๓ธ€ , respectively. Then, for some๐‘ฅ๐‘–(index๐‘–is an order in a host sequence) the number of elements inE0with๐‘ฅvalue less than๐‘ฅ๐‘–should be equal to the number of elements inE๓ธ€ 0 that have๐‘ฅ๓ธ€  value less than๐‘ฅ๓ธ€ ๐‘–. Integration should be used in case we switch from discrete distribution of samples inE0 andE๓ธ€ 0to continuous one. Further, throughout the paper we assume that the constant of integration is zero for indefinite

integrals. Hence, the truth values for both predicates๐‘ˆand๐‘‰ are defined as

(๐‘ˆ๐‘ฅ๐‘ฅ๓ธ€ โ‰ก (โˆซ ๐‘“E0(๐‘ฅ) ๐‘‘๐‘ฅ = โˆซ ๐‘“E๓ธ€ 0(๐‘ฅ๓ธ€ ) ๐‘‘๐‘ฅ๓ธ€ )) ,

(โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) , (17)

(๐‘‰๐‘ฅ๐‘ฅ๓ธ€ โ‰ก (โˆซ ๐‘“E1(๐‘ฅ) ๐‘‘๐‘ฅ = โˆซ ๐‘“E๓ธ€ 1(๐‘ฅ๓ธ€ ) ๐‘‘๐‘ฅ๓ธ€ )) ,

(โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) . (18)

Further, we introduce logical formula๐น2

๐น2 โ‰ก ((โˆƒ๐‘ฅ๓ธ€ ) ๐‘ˆ๐‘ฅ๐‘ฅ๓ธ€ &(โˆƒ๐‘ฅ๓ธ€ ) ๐‘‰๐‘ฅ๐‘ฅ๓ธ€ ) , (โˆ€๐‘ฅ) (19) and state that argument

๐น2, (11) , (16) โŠจ ๐น1 (20) is valid. The task of watermark embedding is to assure that the mentioned argument is sound. For that purpose, a procedure that makes๐น2true should be proposed.

3.2. Quantization Equations. Quantization equations and their solutions are needed to satisfy formula ๐น2 during embedding. For this purpose, we will analyze conditions that enforce qualities of predicates ๐‘ˆ and ๐‘‰. Due to the large number of variables in the text we recommend to refer to Nomenclature section for clarity. We can rewrite elements of (17) in the following way:

โˆซ ๐‘“E0(๐‘ฅ) ๐‘‘๐‘ฅ = {{ {{ {{ {

min(๐‘ฅ, ๐ฟ2) ๐œ” (๐œ‘1+ ๐œ‚1) + ๐‘ฅ (๐›พ0+ ๐œ—0)

ฮ”๐ท๐‘0 , if๐‘ฅ โ‰ค ๐ฟ1;

๐œ” +(1 โˆ’ ๐œ”) ๐‘ฅ (๐›พ0+ ๐œ—0)

ฮ”๐ท๐‘0 , otherwise,

โˆซ ๐‘“E๓ธ€ 0(๐‘ฅ๓ธ€ ) ๐‘‘๐‘ฅ๓ธ€ = {{ {{ {{ {

(๐œ” + ๐›พ0 1 โˆ’ ๐œ”

๐›พ0+ ๐œ—0) โˆซ ๐‘“0(๐‘ฅ๓ธ€ ) ๐‘‘๐‘ฅ๓ธ€ , if๐‘ฅ๓ธ€ โ‰ค ฮ”๐›ฝ;

(๐œ” + ๐›พ0 1 โˆ’ ๐œ”

๐›พ0+ ๐œ—0) + ๐œ—0 1 โˆ’ ๐œ”

๐›พ0+ ๐œ—0 (โˆซ ๐‘“1(๐‘ฅ๓ธ€ ) ๐‘‘๐‘ฅ๓ธ€ + โˆซ0

ฮ”๐›ฝ๐‘“1(๐‘ฅ๓ธ€ ) ๐‘‘๐‘ฅ๓ธ€ ) , otherwise.

(21)

From (21) it is clear that

โˆซ๐ฟ1

0 ๐‘“E0(๐‘ฅ) ๐‘‘๐‘ฅ = โˆซฮ”(๐›ฝโˆ’๐›ผ)

0 ๐‘“E๓ธ€ 0(๐‘ฅ๓ธ€ ) ๐‘‘๐‘ฅ๓ธ€ 

= ๐œ” + ๐›พ0 1 โˆ’ ๐œ”

๐›พ0+ ๐œ—0. (22) The equation above means that the following is true:

(๐‘ˆ๐‘ฅ๐‘ฅ๓ธ€ โŠƒ (((๐‘ฅ โ‰ค ๐ฟ1)&(๐‘ฅ๓ธ€ โ‰ค ฮ”๐›ฝ))

โˆจ ((๐‘ฅ > ๐ฟ1)&(๐‘ฅ๓ธ€ > ฮ”๐›ฝ)))) , (โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) .

(23)

We introduce two two-place predicates๐‘ˆ1and๐‘ˆ2: (((๐‘ˆ๐‘ฅ๐‘ฅ๓ธ€ &(๐‘ฅ โ‰ค ๐ฟ1)&(๐‘ฅ๓ธ€ โ‰ค ฮ”๐›ฝ)) โ‰ก ๐‘ˆ1๐‘ฅ๐‘ฅ๓ธ€ )

&((๐‘ˆ๐‘ฅ๐‘ฅ๓ธ€ &(๐‘ฅ > ๐ฟ1)&(๐‘ฅ๓ธ€ > ฮ”๐›ฝ)) โ‰ก ๐‘ˆ2๐‘ฅ๐‘ฅ๓ธ€ )) , (โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) .

(24)

According to (21) and (24) the following can be derived:

(๐‘ˆ1๐‘ฅ๐‘ฅ๓ธ€ โ‰ก (ฮฅ1(๐‘ฅ, ๐œ”, ๐›พ0, ๐œ—0, ๐œ‘1, ๐œ‚1) = 0.5๐‘๐‘ฅ๓ธ€ 2+ ๐œ๐‘ฅ๓ธ€ )) ,

(8)

(โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) , (๐‘ˆ2๐‘ฅ๐‘ฅ๓ธ€ โ‰ก (ฮฅ2(๐‘ฅ, ๐œ”, ๐›พ0, ๐œ—0, ๐œ‘1, ๐œ‚1) = ๐‘” (๐‘ฅ๓ธ€ โˆ’ ฮ”๐›ฝ))) ,

(โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) , (25) where

ฮฅ1(๐‘ฅ, ๐œ”, ๐›พ0, ๐œ—0, ๐œ‘1, ๐œ‚1)

= (๐›พ0+ ๐œ—0)min(๐‘ฅ, ๐ฟ2) ๐œ” (๐œ‘1+ ๐œ‚1) + ๐‘ฅ (๐›พ0+ ๐œ—0) ฮ”๐ท๐‘0(๐›พ0+ ๐œ”๐œ—0) , ฮฅ2(๐‘ฅ, ๐œ”, ๐›พ0, ๐œ—0, ๐œ‘1, ๐œ‚1) = ๐‘ฅ (๐›พ0+ ๐œ—0)2โˆ’ ๐›พ0ฮ”๐ท๐‘0

๐œ—0ฮ”๐ท๐‘0 . (26) Now, let us analyze conditions that enforce quality of predi- cate๐‘‰. Elements of (18) can be represented as

โˆซ ๐‘“E1(๐‘ฅ) ๐‘‘๐‘ฅ = {{ {{ {{ {{ {

(1 โˆ’ ๐œ”) ๐‘ฅ (๐œ‘1+ ๐œ‚1)

ฮ” (1 โˆ’ ๐ท๐‘0) , if๐‘ฅ โ‰ค ๐ฟ2;

max(๐‘ฅ โˆ’ ๐ฟ1, 0) ๐œ” (๐›พ0+ ๐œ—0) + (๐‘ฅ โˆ’ ๐ฟ2) (๐œ‘1+ ๐œ‚1)

ฮ” (1 โˆ’ ๐ท๐‘0) , otherwise,

โˆซ ๐‘“E๓ธ€ 1(๐‘ฅ๓ธ€ ) ๐‘‘๐‘ฅ๓ธ€ = {{ {{ {{ {

(1 โˆ’ ๐œ”) ๐œ‚1

๐œ‘1+ ๐œ‚1 โˆซ ๐‘“0(๐‘ฅ๓ธ€ ) ๐‘‘๐‘ฅ๓ธ€ , if ๐‘ฅ๓ธ€ โ‰ค ฮ”๐›ฝ;

(1 โˆ’ ๐œ”) ๐œ‚1

๐œ‘1+ ๐œ‚1 + (๐œ” + ๐œ‘1 1 โˆ’ ๐œ”

๐œ‘1+ ๐œ‚1) (โˆซ ๐‘“1(๐‘ฅ๓ธ€ ) ๐‘‘๐‘ฅ๓ธ€ + โˆซ0

ฮ”๐›ฝ๐‘“1(๐‘ฅ๓ธ€ ) ๐‘‘๐‘ฅ๓ธ€ ) , otherwise.

(27)

We can see that according to (25)

โˆซ๐ฟ2

0 ๐‘“E1(๐‘ฅ) ๐‘‘๐‘ฅ = โˆซฮ”(๐›ฝโˆ’๐›ผ)

0 ๐‘“E๓ธ€ 1(๐‘ฅ๓ธ€ ) ๐‘‘๐‘ฅ๓ธ€ = (1 โˆ’ ๐œ”) ๐œ‚1 ๐œ‘1+ ๐œ‚1 . (28) This means that the following expression is true:

(๐‘‰๐‘ฅ๐‘ฅ๓ธ€ โŠƒ (((๐‘ฅ โ‰ค ๐ฟ2)&(๐‘ฅ๓ธ€ โ‰ค ฮ”๐›ฝ))

โˆจ ((๐‘ฅ > ๐ฟ2)&(๐‘ฅ๓ธ€ > ฮ”๐›ฝ)))) , (โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) .

(29)

Next, two two-place predicates๐‘‰1and๐‘‰2are defined as (((๐‘‰๐‘ฅ๐‘ฅ๓ธ€ &(๐‘ฅ โ‰ค ๐ฟ2)&(๐‘ฅ๓ธ€ โ‰ค ฮ”๐›ฝ)) โ‰ก ๐‘‰1๐‘ฅ๐‘ฅ๓ธ€ )

&((๐‘‰๐‘ฅ๐‘ฅ๓ธ€ &(๐‘ฅ > ๐ฟ2)&(๐‘ฅ๓ธ€ > ฮ”๐›ฝ)) โ‰ก ๐‘‰2๐‘ฅ๐‘ฅ๓ธ€ )) , (โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) .

(30) According to (27) and (30) the following can be derived:

(๐‘‰1๐‘ฅ๐‘ฅ๓ธ€ โ‰ก (ฮฅ3(๐‘ฅ, ๐œ”, ๐›พ0, ๐œ—0, ๐œ‘1, ๐œ‚1) = 0.5๐‘๐‘ฅ๓ธ€ 2+ ๐œ๐‘ฅ๓ธ€ )) , (โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) , (๐‘‰2๐‘ฅ๐‘ฅ๓ธ€ โ‰ก (ฮฅ4(๐‘ฅ, ๐œ”, ๐›พ0, ๐œ—0, ๐œ‘1, ๐œ‚1) = ๐‘” (๐‘ฅ๓ธ€ โˆ’ ฮ”๐›ฝ))) ,

(โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) , (31)

where

ฮฅ3(๐‘ฅ, ๐œ”, ๐›พ0, ๐œ—0, ๐œ‘1, ๐œ‚1) = ๐‘ฅ (๐œ‘1+ ๐œ‚1)2 ๐œ‚1ฮ” (1 โˆ’ ๐ท๐‘0),

ฮฅ4(๐‘ฅ, ๐œ”, ๐›พ0, ๐œ—0, ๐œ‘1, ๐œ‚1) = (๐œ‘1+ ๐œ‚1) (max(๐‘ฅ โˆ’ ๐ฟ1, 0) ๐œ” (๐›พ0+ ๐œ—0) + (๐‘ฅ โˆ’ ๐ฟ2) (๐œ‘1+ ๐œ‚1)) โˆ’ ฮ” (1 โˆ’ ๐ท๐‘0) (1 โˆ’ ๐œ”) ๐œ‚1

ฮ” (1 โˆ’ ๐ท๐‘0) (๐œ‘1+ ๐œ”๐œ‚1) .

(32)

We can express๐‘ˆusing๐‘ˆ1and๐‘ˆ2in the following way:

(๐‘ˆ๐‘ฅ๐‘ฅ๓ธ€ 

โ‰ก (((๐‘ฅ โ‰ค ๐ฟ1) โŠƒ ๐‘ˆ1๐‘ฅ๐‘ฅ๓ธ€ )&((๐‘ฅ > ๐ฟ1) โŠƒ ๐‘ˆ2๐‘ฅ๐‘ฅ๓ธ€ ))) , (โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) .

(33)

Also, we can express๐‘‰using๐‘‰1and๐‘‰2: (๐‘‰๐‘ฅ๐‘ฅ๓ธ€ 

โ‰ก (((๐‘ฅ โ‰ค ๐ฟ2) โŠƒ ๐‘‰1๐‘ฅ๐‘ฅ๓ธ€ )&((๐‘ฅ > ๐ฟ2) โŠƒ ๐‘‰2๐‘ฅ๐‘ฅ๓ธ€ ))) , (โˆ€๐‘ฅ) (โˆ€๐‘ฅ๓ธ€ ) .

(34)

(9)

Begin

X,b,ฮ”,๐œƒ, ๐œ”, ฮฅ1, ฮฅ2, ฮฅ3, ฮฅ4

No

No No

No

Yes

Yes

Yes xiโ‰ฅ L2 Yes xiโ‰ค L1

x๓ณฐ€iโ†ฮฅ4+ gฮ”๐›ฝ

g x๓ณฐ€iโ†ฮฅ2+ gฮ”๐›ฝ g

i > |X| X๓ณฐ€ End

xiโˆˆE0

i โ†1

x๓ณฐ€iโ†โˆš๐œ2+ 2ฮฅ3c โˆ’ ๐œ

c x๓ณฐ€iโ†โˆš๐œ2+ 2ฮฅ1c โˆ’ ๐œ

c

x๓ณฐ€iโ†’X๓ณฐ€, i โ† i + 1

Figure 5: Quantization diagram for the๐‘˜th embedding interval.

Further, utilizing property๐ฟ2โ‰ค ๐ฟ1we can obtain ((๐‘ฅ โ‰ค ๐ฟ2) โŠƒ ((โˆƒ๐‘ฅ๓ธ€ ) (๐‘ˆ1๐‘ฅ๐‘ฅ๓ธ€ )&(โˆƒ๐‘ฅ๓ธ€ ) (๐‘‰1๐‘ฅ๐‘ฅ๓ธ€ ))) ,

(โˆ€๐‘ฅ) , ((๐ฟ2< ๐‘ฅ โ‰ค ๐ฟ1)

โŠƒ ((โˆƒ๐‘ฅ๓ธ€ ) (๐‘ˆ1๐‘ฅ๐‘ฅ๓ธ€ )&(โˆƒ๐‘ฅ๓ธ€ ) (๐‘‰2๐‘ฅ๐‘ฅ๓ธ€ ))) , (โˆ€๐‘ฅ) , ((๐ฟ1< ๐‘ฅ) โŠƒ ((โˆƒ๐‘ฅ๓ธ€ ) (๐‘ˆ2๐‘ฅ๐‘ฅ๓ธ€ )&(โˆƒ๐‘ฅ๓ธ€ ) (๐‘‰2๐‘ฅ๐‘ฅ๓ธ€ )))

โŠจ ๐น2, (โˆ€๐‘ฅ) .

(35)

Here, each premise should be true. With the aim to provide this, equations in (25) and (31) should be solvable. It can be seen that the solutions are straightforward:

๐‘ฅ๓ธ€ ๐‘ˆ1,๐‘‰1= โˆš๐œ2+ 2ฮฅ1,3๐‘ โˆ’ ๐œ

๐‘ , (36)

๐‘ฅ๓ธ€ ๐‘ˆ2,๐‘‰2= ฮฅ2,4+ ๐‘”ฮ”๐›ฝ

๐‘” , (37)

where, for example, in (36), ๐‘ฅ๓ธ€ ๐‘ˆ1,๐‘‰1 denotes the values of ๐‘ฅ๓ธ€  that turn either ๐‘ˆ1๐‘ฅ๐‘ฅ๓ธ€  or ๐‘‰1๐‘ฅ๐‘ฅ๓ธ€  true for ฮฅ1(โ‹…)or ฮฅ3(โ‹…), respectively. The diagram of quantization is represented in

Figure 5. Each ๐‘–th original sample is chosen from array X on ๐‘–th iteration. The corresponding bit of a watermark is chosen from arrayb. Vector ๐œƒcontains parameters of the quantization. At the end of each iteration, quantized value of ๐‘–th sample is written to arrayX๓ธ€ .

4. Robustness under AWGN

In this section, we will analytically estimate the robust- ness of the proposed watermarking scheme under AWGN.

Robustness is reflected by the term โ€œextracted informationโ€

which denotes mutual information between embedded and detected messages. In contrast to channel capacity, the index of extracted information is practical but depends on the algorithm of detection. Also, throughout this section we assume that the original samples are distributed uniformly inside the quantization interval.

The derivations for extracted information are less involved whenฮฉis โ€œfalse.โ€ Therefore, only that condition is considered here. In order to estimate extracted information we first find error rates. The rates depend on the attack severity (represented by๐œŽ),ฮ”, and parameter set๐œƒ = {๐›พ0, ๐œ‘1, ๐œ‚1, ๐œ—0, ๐›ผ, ๐›ฝ}. Moreover, we derive a stronger statement that information aboutฮ”/๐œŽ and ๐œƒ is sufficient to perform analytic estimation of error rates for our watermarking scheme. Finally, we will demonstrate how error rates can be expressed using WNR and๐œƒ.

(10)

4.1. Estimation of Error Rates. For our estimation, it is consid- ered that, during watermark extraction, in each embedding interval samples that interpret โ€œ0โ€ are separated from samples that interpret โ€œ1โ€ using a threshold (e.g., hard decision region detector). The position of the threshold in ๐‘–th embedding interval is Th+ [ฮ” โˆ’ 2Th]mod(๐‘– โˆ’ ๐‘˜, 2)(dashed vertical lines in Figure 1(b)). Therefore, the whole real number line can be seen as a union of two domains:

Z= โ‹ƒโˆž

๐‘š=โˆ’โˆž[2ฮ”๐‘š + ๐‘™ฮ”๐‘˜โˆ’Th, 2ฮ”๐‘š + ๐‘™๐‘˜ฮ”+Th) , (38) O= โ‹ƒโˆž

๐‘š=โˆ’โˆž[2ฮ”๐‘š + ๐‘™ฮ”๐‘˜+Th, 2ฮ” (๐‘š + 1) + ๐‘™ฮ”๐‘˜โˆ’Th) . (39) During extraction, all the elements inZ will be labeled โ€œ0โ€

and all the elements inO will be labeled โ€œ1.โ€

After noise is added, elements quantized in๐‘˜th embed- ding interval might spread over its limits and other notations should be used. We notate sample values that are affected by noise as๐œ๓ธ€ ๐‘›. Also,๐œ๓ธ€ ๐‘›belongs to some embedding interval and inside this interval we use๐‘ฅ๓ธ€ ๐‘›= ๐œ๓ธ€ ๐‘› โˆ’ ฮ”โŒŠ๐œ๓ธ€ ๐‘›/ฮ”โŒ‹. Random variablesฮฃ๓ธ€ ๐‘›and๐‘‹๓ธ€ ๐‘›represent๐œ๐‘›๓ธ€ and๐‘ฅ๓ธ€ ๐‘›, respectively (alterna- tively we use ฬ‡ฮฃ๓ธ€ and ฬ‡๐‘‹๓ธ€ to save space in lower subscript part).

Therefore, two modified sets are obtained:E๓ธ€ 0 ๓ณจ€๓ณจ€๓ณจ€๓ณจ€๓ณจ€โ†’ ฬ‡ฮฃAWGN ๓ธ€ 0; E๓ธ€ 1 ๓ณจ€๓ณจ€๓ณจ€๓ณจ€๓ณจ€โ†’ ฬ‡ฮฃAWGN ๓ธ€ 1. For noise variance๐œŽ2we might, for instance, estimate the expected fraction for each of the noisy sets ฬ‡ฮฃ๓ธ€ 0 and ฬ‡ฮฃ๓ธ€ 1inZ. Fractions of ฬ‡ฮฃ๓ธ€ 0and ฬ‡ฮฃ๓ธ€ 1that belong toO can be found in a trivial manner. In that way we obtain error rates for โ€œ0โ€ and โ€œ1.โ€

However, instead of appealing directly to sets ฬ‡ฮฃ๓ธ€ 0 and

ฬ‡ฮฃ๓ธ€ 1, we use an indirect but computationally lighter approach.

In case ฮฉ is โ€œfalseโ€ we can conclude for the following distributions of quantized samples (not affected by AWGN yet) that

๐‘“EฬŒ๓ธ€ 

0(๐‘ฅ๓ธ€ ) = ๐‘“EฬŒ๓ธ€ 

1(๐‘ฅ๓ธ€ ) = ๐‘“0(๐‘ฅ๓ธ€ ) , (40) where

( ฬŒ๐ธ๓ธ€ 0๐‘–๐‘ฅ๓ธ€ โ‰ก (๐ธ0๓ธ€ ๐‘–๐‘ฅ๓ธ€ &(๐‘ฅ๓ธ€ โ‰ค ฮ” (๐›ฝ โˆ’ ๐›ผ)))) , (โˆ€๐‘–) (โˆ€๐‘ฅ๓ธ€ ) , ( ฬŒ๐ธ๓ธ€ 1๐‘–๐‘ฅ๓ธ€ โ‰ก (๐ธ1๓ธ€ ๐‘–๐‘ฅ๓ธ€ &(๐‘ฅ๓ธ€ โ‰ค ฮ” (๐›ฝ โˆ’ ๐›ผ)))) , (โˆ€๐‘–) (โˆ€๐‘ฅ๓ธ€ ) .

(41)

Also, we can conclude that the following distributions are also identical:

๐‘“Eฬ‚๓ธ€ 

0(๐‘ฅ๓ธ€ ) = ๐‘“ฬ‚E๓ธ€ 

1(๐‘ฅ๓ธ€ ) = ๐‘“1(๐‘ฅ๓ธ€ ) , (42) where

(ฬ‚๐ธ๓ธ€ 0๐‘–๐‘ฅ๓ธ€ โ‰ก (๐ธ๓ธ€ 0๐‘–๐‘ฅ๓ธ€ &(๐‘ฅ๓ธ€ โ‰ฅ ฮ”๐›ฝ))) , (โˆ€๐‘–) (โˆ€๐‘ฅ๓ธ€ ) , (ฬ‚๐ธ๓ธ€ 1๐‘–๐‘ฅ๓ธ€ โ‰ก (๐ธ๓ธ€ 1๐‘–๐‘ฅ๓ธ€ &(๐‘ฅ๓ธ€ โ‰ฅ ฮ”๐›ฝ))) , (โˆ€๐‘–) (โˆ€๐‘ฅ๓ธ€ ) .

(43)

For any ๐œŽ, (40) means that, for example, the fraction of elements fromEฬŒ๓ธ€ 0that after AWGN appear inZ is equal to

that ofEฬŒ๓ธ€ 1 and can be calculated using๐‘“0(๐‘ฅ๓ธ€ ). This fraction will be denoted as ฬŒ๐นZ. The PDF of AWGN with variance๐œŽ๐‘›2is denoted as๐‘“N[๐œ๓ธ€ ๐‘›โˆ’๐œ๓ธ€ , 0, ๐œŽ๐‘›]using parameters๐œ๓ธ€ = ๐‘ฅ๓ธ€ +๐‘™ฮ”๐‘˜and ๐œ๓ธ€ ๐‘›. Therefore

ฬŒ๐นZ

= โˆซZโˆซฮ”(๐›ฝโˆ’๐›ผ)

0 ๐‘“0(๐‘ฅ๓ธ€ ) ๐‘“N[๐œ๐‘›๓ธ€ โˆ’ ๐‘ฅ๓ธ€ โˆ’ ๐‘™๐‘˜ฮ”, 0, ๐œŽ๐‘›] ๐‘‘๐‘ฅ๓ธ€ ๐‘‘๐œ๓ธ€ ๐‘›. (44) Fraction of elements fromEฬ‚๓ธ€ 0that after AWGN appear inZ will be denoted asฬ‚๐นZ:

ฬ‚๐นZ= โˆซ

Zโˆซฮ”

ฮ”๐›ฝ๐‘“1(๐‘ฅ๓ธ€ ) ๐‘“N[๐œ๓ธ€ ๐‘›โˆ’ ๐‘ฅ๓ธ€ โˆ’ ๐‘™๐‘˜ฮ”, 0, ๐œŽ๐‘›] ๐‘‘๐‘ฅ๓ธ€ ๐‘‘๐œ๓ธ€ ๐‘›. (45) Error rates are calculated using ฬŒ๐นZandฬ‚๐นZ:

BER0= (1 โˆ’ ฬŒ๐นZ) ๐›พ0

๐›พ0+ ๐œ—0 + (1 โˆ’ ฬ‚๐นZ) ๐œ—0 ๐›พ0+ ๐œ—0, BER1= ฬŒ๐นZ ๐œ‚1

๐œ‘1+ ๐œ‚1 + ฬ‚๐นZ ๐œ‘1 ๐œ‘1+ ๐œ‚1.

(46)

In order to demonstrate that error rates can be calculated based on ฮ”/๐œŽ, ๐œƒwe analyze expression for ฬŒ๐นZ (expression for ฬ‚๐นZ can be analyzed in a similar way). Function๐‘“0(๐‘ฅ๓ธ€ ) is present in (44). According to (2) it is defined using parameters๐‘,๐œ. Parameters๐›ผ,๐›ฝare also present in (2) as well as in (44). Parameters๐›ผ,๐›ฝhave clear constraints (the same is true about๐›พ0,๐œ—0,๐œ‘1,๐œ‚1). It is possible to express๐‘,๐œusing๐›ผ, ๐›ฝ,๐›พ0,๐œ—0,๐œ‘1,๐œ‚1. In the realization of our method parameter๐œ is set as

๐œ = ๐›พ0+ ๐œ—0

ฮ”๐›พ0 . (47)

Defining new parameter ฬ๐œas

ฬ๐œ = ๐œฮ”, (48)

it can be seen that ฬ๐œ = (๐›พ0+ ๐œ—0)/๐›พ0does not depend on the choice ofฮ”.

Using property of PDF, the following is obtained from (2):

โˆซ(๐›ฝโˆ’๐›ผ)ฮ”

0 ๐‘“0(๐‘ฅ๓ธ€ ) ๐‘‘๐‘ฅ๓ธ€ = ๐‘(๐›ฝ โˆ’ ๐›ผ)2ฮ”2

2 + ๐œฮ” (๐›ฝ โˆ’ ๐›ผ)

= 1.

(49)

It is easy to derive from (48) and (49) that ๐‘ฮ”2= 21 โˆ’ ฬ๐œ (๐›ฝ โˆ’ ๐›ผ)

(๐›ฝ โˆ’ ๐›ผ)2 . (50)

According to (50), it is also obvious that parameter

ฬ๐‘ = ๐‘ฮ”2 (51)

is independent ofฮ”.

Viittaukset

LIITTYVร„T TIEDOSTOT

[r]

Updated timetable: Thursday, 7 June 2018 Mini-symposium on Magic squares, prime numbers and postage stamps organized by Ka Lok Chu, Simo Puntanen. &amp;

While the results revealed that - in general - attitudes towards migrated children, married people and workers were positive but attitudes towards unemployed and refugees were

It is that all we know concerning the Judaism that the rabbis take for granted in a long sequence of basic writings concerns diverse documents, specific propositions and

Shamanism is by no means the only religious movement that has germin- ated among the indigenous peoples of Siberia in post-Soviet times.. There has been, and still is, a

The researchers involved in this study suggest that childrenโ€™s own experiences of languages fundamentally affect the way in which they see and make sense of the world, in other

The effects of the decreased land-based nutrient load can best be seen in the eastern part of the gulf, where nutrient discharges have been reduced the most, and where the main

On the other side, the Qurสพฤnic disciplines (สฟulลซm al-Qurสพฤn) have developed a number of textual and hermeneutical tools to contextalize the text in view of the general