|
|
|
|
Main     Background         Methods         Results     Conclusions         Group Members     |
Results |
After completing experiments in both the time and frequency
domains, we found that signals of various qualities can be used
simultaneously, one for the base and one for the message. We also
discovered some of the strengths and weaknesses of doing
steganograpy in each domain.
A few of the strengths of the frequency domain are that the base
only needs to have the same number of samples as the message.
This means that a longer message can be hidden in a given base
signal than in the time domain. Also, this algorithm is easy to
implement in simple circuit elements that we already know about.
Finally, the frequency domain implementation is also much less
likely than the time domain to be affected by errors that occur
during transmission. On the down side, this algorithm has a lot
of distortion in the combined signal. This includes an audible
high-pitched cosine that occurs from the modulation. Also,
because of the filtering that occurs, the message signal has a
limited frequency range and low recovery quality.
When steganography was imlplemented in the time domain, we
found that it had strengths and weaknesses opposite of those in
the frequency domain. There was almost no distortion in the
combined signals if only a quarter of the base signal's bits were
used to hide the signal. Also, the message could be perfectly
recovered and had no frequency limitations. The disadvantages
are that the base signalneeds to be longer than the message (see
time domain methods) and that without DSP chips, this is harder
to implement in circuitry. In addition, this method is extremely
easy to corrupt during transmission. This could be resolved by
encoding the message using hamming code to detect errors. If a
hash table was used to determine which samples had bits replaced,
this could be a very effective method for digital watermarking.
|
|
![]() |