<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Hiding data in images using a pseudo-random sequence</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>V. N. Karazin Kharkiv National University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svobody sq.</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kharkiv</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine kuznetsov@karazin.ua</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Central Ukrainian National Technical University</institution>
          ,
          <addr-line>avenue University, 8, Kropivnitskiy, 25006</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In this article are discussed techniques of hiding information messages in cover image using direct spectrum spreading technology. This technology is based on the use of poorly correlated pseudorandom (noise) sequences. Modulating the information data with such signals, the message is presented as a noise-like form, which makes it very difficult to detect. Hiding means adding a modulated message to the cover image. If this image is interpreted as noise on the communication channel, then the task of hiding user's data is equivalent to transmitting a noise-like modulated message on the noise communication channel. At the same it is supposed that noise-like signals are poorly correlated both with each other and with the cover image (or its fragment). However, the latter assumption may not be fulfilled because a realistic image is not an implementation of a random process; its pixels have a strong correlation. Obviously, the selection of pseudo-random spreading signals must take this feature into account. We are investigating various ways of formation spreading sequences while assessing Bit Error Rate (BER) of information data as well as cover image distortion by mean squared error (MSE) and by Peak signal-to-noise ratio (PSNR). The purpose of our work is to justify the choice of extending sequences to reduce BER and MSE (increase PSNR).</p>
      </abstract>
      <kwd-group>
        <kwd>information concealment</kwd>
        <kwd>steganography</kwd>
        <kwd>direct spectrum spreading technology</kwd>
        <kwd>pseudorandom sequences</kwd>
        <kwd>spreading signals</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Steganographic techniques are traditionally used to hide the fact of transmission and
the very existence of the information message [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ]. With the development of
computer science and digital methods of information processing, steganographic hiding of
messages has become very common, it is used in image, audio, text documents
processing etc. It is a very effective and reliable way to organize secret channels. For a
third viewer, the covers that are transmitted (e.g. via e-mail) and contain information
messages, hidden in them, are no different from ordinary user files. It gives the chance
to organize a secret communication channel, without causing suspicions about the
intentions, and to detect such channels it is extremely difficult [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. One of the
promising trends in the development of modern steganography is the technique of
embedding data in cover image, based on direct spectrum expansion technology [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref5 ref6 ref7 ref8 ref9">5-17</xref>
        ]. This
technology is traditionally used in communication systems to increase the latency of
data transmission over a channel with noise [
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15 ref16 ref17">12-17</xref>
        ]. Information data are modulated
by expanding spectrum pseudo-random (noise) sequence. During transmission the
received signals are statistically indistinguishable from natural noise, which increases
communication latency.
      </p>
      <p>
        Besides, the implemented methods of correlation reception allow providing
correction of the occurred errors, which increases error correction of communication. These
and many other advantages of direct spread spectrum technology allow building
reliable and secure communication systems. For example, communication with
significantly lower transmitter power can be arranged, which ensures environmentally
friendly communication; application of large ensembles (sets) of expanding sequences
allows increasing subscriber capacity of multiple access, etc. [
        <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21">18-21</xref>
        ].
      </p>
      <p>The same approach can be applied to the computer processing of digital images.
Interpreting the image as noise in a communication channel and using the technology
of direct spectrum extension, it is possible to organize hiding of information messages
without visible container distortion. Such techniques are the subject of our article.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Literature review and research objective</title>
      <p>
        In the first works of using the direct spectrum expansion technology in digital
steganography the idea of using pseudo-random (noise) sequences as a "carrier" of
information messages was put forward [
        <xref ref-type="bibr" rid="ref10 ref11 ref5 ref6 ref7 ref8 ref9">5-11</xref>
        ]. For example, for a binary case, a modulated
message S is obtained by multiplying separate information bits bi (represented in
polar form bi {1,1} ) by an expanding noise signal  i :
(1)
      </p>
      <p>Moreover i belongs to an ensemble (set) of poorly correlated pseudo random
sequences (PRS):</p>
      <p>S   bii ,</p>
      <p>i
i   0 ,1,..., M 1</p>
      <p>i  j :  (i , j )  0</p>
      <p>This means that the correlation coefficient of two different signals (calculated as a
scalar product of the sequences) is roughly equal zero:</p>
      <p>
        Expression (1), which describes the process of modulation of information bits
bi {1,1} by expanding signals i , is traditionally used in a broadband
communication system with direct spectrum extension. Since the expanding signal i on its
statistical properties is similar to noise, then the received modulated message S is
slightly different from the noise in the communication channel, which allows making
hidden transmission. Indeed, the transmitted messages get the form of noise-like
sequences, and due to the high power of the set  and the direct expansion of the
frequency spectrum high secrecy and imitation resistance of organized communication
channels are provided [
        <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21">18-21</xref>
        ]. In systems with Code Division Multiple Access
(CDMA) each signal i is assigned to a separate pair of subscribers in other words
the increase of cardinality M of a set   0 ,1,..., M 1 allows you to increase the
subscriber capacity of communication systems that makes data transfer cheaper [
        <xref ref-type="bibr" rid="ref18 ref19">18,
19</xref>
        ]. Steganography using direct spectrum extension uses these techniques in various
files covers. For example, by interpreting a cover image I as natural noise in a
communication channel is possible to organize the transmission of information messages
"inside" the image [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref5 ref6 ref7 ref8 ref9">5-17</xref>
        ]. In works [
        <xref ref-type="bibr" rid="ref10 ref11 ref5 ref6 ref7 ref8 ref9">5-11</xref>
        ] was suggested to use the sequences formed
by PRS generators as a signals i , after which the signal S formed by rule (1) is
elementary summed up with the cover image I :
      </p>
      <p>N  I  S .</p>
      <p>Thus, the resulting stegano-cover image (2) is formed by adding a modulated
message I to the original image (1). It is similar to how in communication systems the
transferred modulated message S developed with natural noise.</p>
      <p>On the receiving side, as in communication systems, the information message is
restored using a correlation reception. For the binary case to extract the j -th bit
calculate the correlation coefficient between the signal j and the received N :
(2)
(3)
(4)
Unfortunately, for steganographic applications the assumption   I , j   I j  0 in
(3) may not execute, when a cover image I is used. Indeed, if a realistic image, which
is not an implementation of some random value sensor, is used to hide an information
message, then a significant correlation I and i can be observed. In this case, the
recovery of information bits by formula (4) may be erroneous. In this paper we
investi  N , j   I j  j  bii .</p>
      <p>i</p>
      <p>In communication systems, natural noise and noise signal  i are statistically
independent (uncorrelated). Following our interpretations, it is logical to assume that the
analogue of noise, the cover image I , is also uncorrelated to expansion signals, in
other words to say   I , j   I j  0 . Different noise signals are also non-correlated
to each other, i.e. j  i : j i  0 . In this case   N, j   bj j j , i.e. value bj can
be symbolized   N, j  :</p>
      <p>
        bj  sign   N, j  .
gate different ways of generating a set    0 ,1,..., M 1 and estimate the Bit Error
Rate (BER) when extracting a message from cover images N . In particular, we
investigate the nonlinear method of formation of sequences with normal Gaussian
distribution proposed in [
        <xref ref-type="bibr" rid="ref10 ref11 ref7 ref8">7, 8, 10, 11</xref>
        ], as well as Walsh's orthogonal sequences [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] and
pseudo-random sequences with elements uniformly distributed on the interval (-1,1).
We also estimate cover image distortions by mean squared error (MSE) and Peak
signal-to-noise (PSNR). These two important characteristics (BER and PSNR)
clearly demonstrate the possibilities for reliable (error-free) and hidden (no significant
cover distortion) transmission of information messages using direct spectrum
extension technology.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Research Methodology</title>
      <p>Several performance indicators are used to investigate various ways of hiding
information in cover images.</p>
      <p>
        BER [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] is used to evaluate the correctness of the recovered data (their reliability,
error-free). BER is the number of bit errors Nerror divided by the total number of
transferred bits Ntotal :
      </p>
      <p>
        BER is a unit less performance measure, often expressed as a percentage [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. We
estimated BER in absolute values, i.e., directly by (5).
MSE and PSNR are used to estimate cover image distortion [
        <xref ref-type="bibr" rid="ref23 ref24 ref25">23-25</xref>
        ]. For
monochrome m n image I and its noisy approximation N distorted by error MSE value is
determined by formula:
      </p>
      <p>BER  Nerror .</p>
      <p>Ntotal
MSE 
1 m1 n1</p>
      <p> [Ii, j  Ni, j ]2 .
mn i0 j0
(5)
(6)
(7)</p>
      <p>PSNR characterizes the ratio between maximum signal power and distortion noise
power. PSNR is usually expressed in logarithmic scale, i.e. in decibels:
PSNR  10  log10  MIm2SaEx   20  log10  IMmaSxE  
 20  log10  Imax  10  log10  MSE .
where I max is the maximum possible value of the image pixel.</p>
      <p>If the pixels are encoded with m -bit values, then Imax  2m  1 . For example, for the
simplest case m  8 we have Imax  255 and PSNR value is calculated by formula:
PSNR  20  log10 255  10  log10  MSE  .
(8)</p>
      <p>
        For our experiments we used different 256 256 images, as in [
        <xref ref-type="bibr" rid="ref10 ref11 ref7 ref8">7, 8, 10, 11</xref>
        ], when
encoding each monochrome pixel with one byte. In particular, we used Lenna's
standard test image (256x256 pixels). The results given below are the averaged values
obtained from several different images. For averaging results we used quadratic
regression formulas with interpolation of the obtained results (we used built-in
functions regress and interp of MathCad computer systems).
      </p>
      <p>
        It should be noted that the results given here correspond to the use of different
extension sequences, but without the use of error correction coding. For example, in
operation [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] block codes are used to reduce BER in direct error correction mode. The
same job (e.g. [8, Table 2]) provides BER estimates without using error correction
codes. In this sense, our results can be compared with already available data.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Results of research</title>
      <p>In our research, we have implemented several options for the formation of multiple
expansion signals   0 ,1,..., M 1 . For each method we have realized hiding
information in various cover images and evaluated BER, MSE and PSNR as (5-8).
Our focus was on comparing the obtained results, in order to choose the best method
for forming sequences i .
4.1</p>
      <sec id="sec-4-1">
        <title>Using non-linear modulation</title>
        <p>
          In the works of Lisa M. Marvel et al. [
          <xref ref-type="bibr" rid="ref10 ref11 ref7 ref8">7, 8, 10, 11</xref>
          ] when using the technology of
direct expansion of the spectrum it was suggested to use a nonlinear rule of forming a
set   0 ,1,..., M 1 :
where
        </p>
        <p>1((ui ) j ), bi  1;
(i ) j  
 1((u 'i ) j ), bi  1,
(ui ) j  0.5, ui  0.5;
(u 'i ) j  
(ui ) j  0.5, ui  0.5,
(9)
(10)
(ui ) j - an uniformly distributed random variable over an interval of (0.1) and
1 is an inverse cumulative distribution function for a standard Gaussian random
variable.</p>
        <p>
          Thus, the expanding spectrum sequence of    0 ,1,..., M 1 is a realization of
a random value distributed by a normal law with a zero mean and a single standard
deviation. This random implementation is calculated by formula (9), i.e. using the
inverse transformation method [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ].
        </p>
        <p>For practical implementation of non-linear rule (9)-(10) we used built-in functions
rnd (x) and dnorm( p,  , ) of MathCad computer calculation systems:
 1 ( x)  dnorm( x, 0,1) ; (ui ) j  rnd (1) .</p>
        <p>Obviously, the rule (1) for calculate the modulated signal S at this method of
forming the set   0 ,1,..., M 1 should be written in such form</p>
        <p>S  i .</p>
        <p>i
S   Pi ,</p>
        <p>i</p>
        <p>
          Works [
          <xref ref-type="bibr" rid="ref10 ref11 ref7 ref8">7, 8, 10, 11</xref>
          ] indicate that the direct use of expanding sequences is to hide
information data in the cover images leads to large bit errors in the extracted data. For
this purpose, it was suggested to increase the power of expansion signals, i.e., we will
write down formula (11) in form
where P - positive value, multiply increasing «power» of sequences  i .
In our experiments we have realized hiding data in cover images using formulas (12),
(9) and (10). The received results for different values of P are provided on the
figure 1. The number of terms in (1) and (12) are determined by the number of
information bits, hiding in one cover image container (or a fragment thereof). Figure 1 shows
the different cases for P  2i , i  0,1,..., 6 and for different values of k . The
following notation is used in the figures:
 1) k  1 ;
 2) k  2 ;
 3) k  4 ;
 4) k  8 ;
 5) k  16 .
        </p>
        <p>If the set of signals    0 ,1,..., M 1 generate using a simplified scheme, such as
(ui ) j  0.5, ui  0.5;
(i ) j  1((u 'i ) j ), (u 'i ) j  
(ui ) j  0.5, ui  0.5,
(13)
(11)
(12)
then we can use the analogue of the formula (1) to hide it in the form of
(14)
Fig. 1. Results of experimental studies in hiding data using expressions (12), (9) and (10)
We have also investigated this method of generating expansion signals; the results
are shown in Figures 2.</p>
        <p>Analyzing Figures 1 and 2, we see that both methods of forming expanding
sequences (according to formulas (9), (10) and (13)) give practically equal results. In
our experiments, rule (9), (10) was only slightly better in terms of PSNR (in the
figures, because of the logarithmic scale, it is almost invisible). We should also note the
high BER value. For example, even with "power" expansion signals, the BER value
was in most cases in the range of 0.1 ... 0.01, which is on the threshold of the possible
use of noise-sensitive coding.
4.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Using random numbers uniformly distributed over an interval of (-1,1).</title>
        <p>Another way to form a set that we investigated was to use random numbers uniformly
distributed over a random values of interval of (-1,1). For this purpose we used the
built-in function rnd (x) of the MathCad computer system, i.e. the rule of forming
sequences had the form:
( i ) j  rnd (2)  1 .
(15)
(16)</p>
        <p>The results of our studies on the effectiveness of hiding information of rule (13) for
different ratios of k and P are shown in Figures 3.</p>
        <p>The results shown in Figure 3 are practically comparable with obtained results for
nonlinear modulation (9), (10), and for the simplified version by the formula (13). We
observed a slight increase in BER, but PSNR also increased at the same time. In
general, we can argue that the revealed differences are small and that these methods of
forming expanding sequences are almost equal.
4.3</p>
      </sec>
      <sec id="sec-4-3">
        <title>Use of Walsh orthogonal sequences</title>
        <p>In our research we also used Walsh discrete orthogonal sequences. Such signals are
generated from rows in the Hadamard matrix H 2i formed by a recurrence rule:
H2i1
H2i  
H2i1</p>
        <p>H2i1 </p>
        <p> , H1  1 .</p>
        <p>H2i1 </p>
        <p>An iterative repetition of the rule (16) allows any Hadamard matrix H 2i order 2i ,
i  1, 2,... matrix to be formed. The rows (or columns) of formed matrices are
mutually orthogonal, i.e. their scalar product is zero.</p>
        <p>In our studies we used rule (16) and H 2i matrix rows were interpreted as elements
of the set    0 ,1,..., M 1 , the obtained results of hiding information by formula
(14) are shown in Figures 4.</p>
        <p>Fig. 2. Results of experimental studies in hiding data using expressions (13) and (14).</p>
        <p>Fig. 3. Results of experimental studies in hiding data using expressions (15) and (14).</p>
        <p>Figure 4 clearly shows the advantage of using Walsh sequences. In fact, in our
studies were obtained the lowest BER values. Even at small values P  5 , the BER
was in most cases less than 0.01 and this is the best result of all considered variants of
forming the expansion sequences. PSNR values when using Walsh sequences are in
most cases comparable to the variants considered earlier. However, for a fixed PSNR
value, using Walsh sequence leads to significantly lower BER values.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Discussion of the results and brief conclusions</title>
      <p>The obtained empirical dependencies show that the use of direct spectrum extension
technology can indeed be an interesting solution to the problem of hiding information
messages in cover images. By interpreting an image as noise in a communication
channel, it is possible to organize a hidden data channel, and image distortions may
not be large. At the same time, the basic assumption about the non-correlation of
expansion sequences with the cover (or its separate part) may be incorrect. In this case a
high level of errors will be obtained when restoring the information data.
Consequently, an important element of such steganosystem is the correct choice of
expansion sequences.</p>
      <p>
        In our work we have analyzed several variants of building extension sequences for
hiding data in cover images. In particular, we have considered one of the first known
algorithms with non-linear modulation by rules (9), (10). For this method a US patent
was obtained [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], and we investigated the effectiveness of such hiding by BER, MSE
and PSNR. The obtained data partially coincide with the known results from [
        <xref ref-type="bibr" rid="ref10 ref11 ref7 ref8">7, 8, 10,
11</xref>
        ], which may indirectly confirm the adequacy of our results. At the same time, we
investigated other ways to form expansion sequences for hiding data in cover images.
For example, we have shown that the application of the simplified rule (13) and even
the use of sequences with equidistant values on the interval (-1,1) does not lead to
significant deterioration of the results. For example, the BER and PSNR values do not
differ significantly. Finally, we studied the use of Walsh expansion sequences. As it
turned out, this variant is the most successful, because a much smaller percentage of
errors is achieved with comparable PSNRs. Indeed, the BER value, as it follows from
our results, is much lower than for other extension sequences.
      </p>
      <p>
        The results can be used to improve techniques for hiding information in digital
images [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref5 ref6 ref7 ref8 ref9">5-12</xref>
        ], as well as in other computer science applications [
        <xref ref-type="bibr" rid="ref27 ref28 ref29 ref30 ref31 ref32">27-32</xref>
        ]. In particular,
our results suggest that the use of orthogonal discrete signals is most preferred. In our
opinion, an interesting direction for further research is the use of adaptively formed
discrete sequences. For example, if the rule of forming expansion signals takes into
account the statistical properties of the cover, then it will be possible to significantly
reduce the BER, or get an error-free transmission. Another useful result can be an
increase in PSNR when the BER value is fixed (for example, ahead of the set value).
In addition, we plan to use other ways to form expansion sequences in future studies.
For example, discrete sequences with multilevel correlation functions were proposed
in [
        <xref ref-type="bibr" rid="ref33 ref34 ref35">33–35</xref>
        ]. The use of these signals, in our opinion, will be effective in
steganographic techniques with direct spectrum spreading technology.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Digital</given-names>
            <surname>Watermarking</surname>
          </string-name>
          and Steganography.
          <source>Elsevier</source>
          (
          <year>2008</year>
          ).
          <source>doi:10.1016/b978-0-12- 372585-1.x5001-3</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Shin</surname>
            ,
            <given-names>F.Y.</given-names>
          </string-name>
          :
          <article-title>Digital Watermarking and Steganography</article-title>
          . CRC Press (
          <year>2017</year>
          ).
          <source>doi:10.1201/9781315219783</source>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Johnson</surname>
            ,
            <given-names>N.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jajodia</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Exploring steganography: Seeing the unseen</article-title>
          .
          <source>Computer</source>
          .
          <volume>31</volume>
          ,
          <fpage>26</fpage>
          -
          <lpage>34</lpage>
          (
          <year>1998</year>
          ). doi:
          <volume>10</volume>
          .1109/
          <string-name>
            <surname>MC</surname>
          </string-name>
          .
          <year>1998</year>
          .4655281
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Manoj</surname>
            ,
            <given-names>I.V.S.</given-names>
          </string-name>
          : Cryptography and Steganography.
          <source>International Journal of Computer Applications</source>
          .
          <volume>1</volume>
          ,
          <fpage>63</fpage>
          -
          <lpage>68</lpage>
          (
          <year>2010</year>
          ). doi:
          <volume>10</volume>
          .5120/
          <fpage>257</fpage>
          -
          <lpage>414</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Tirkel</surname>
            ,
            <given-names>A.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Osborne</surname>
            ,
            <given-names>C.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Van</surname>
            <given-names>Schyndel</given-names>
          </string-name>
          ,
          <string-name>
            <surname>R.G.</surname>
          </string-name>
          :
          <article-title>Image watermarking-a spread spectrum application</article-title>
          .
          <source>In: Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications</source>
          .
          <source>IEEE (0)</source>
          . doi:
          <volume>10</volume>
          .1109/isssta.
          <year>1996</year>
          .563231
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>J.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Comiskey</surname>
            ,
            <given-names>B.O.</given-names>
          </string-name>
          :
          <article-title>Modulation and information hiding in images</article-title>
          .
          <source>In: Information Hiding</source>
          . pp.
          <fpage>207</fpage>
          -
          <lpage>226</lpage>
          . Springer Berlin Heidelberg (
          <year>1996</year>
          ). doi:
          <volume>10</volume>
          .1007/3-540-61996- 8_
          <fpage>42</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Marvel</surname>
            ,
            <given-names>L.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boncelet</surname>
            ,
            <given-names>C.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jr.</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Charles</surname>
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Methodology of Spread-Spectrum Image Steganography</article-title>
          .
          <source>Defense Technical Information Center</source>
          (
          <year>1998</year>
          ). doi:
          <volume>10</volume>
          .21236/ada349102
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Marvel</surname>
            ,
            <given-names>L.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boncelet</surname>
            ,
            <given-names>C.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Retter</surname>
          </string-name>
          , C.T.:
          <article-title>Spread spectrum image steganography</article-title>
          .
          <source>IEEE Transactions on Image Processing</source>
          .
          <volume>8</volume>
          ,
          <fpage>1075</fpage>
          -
          <lpage>1083</lpage>
          (
          <year>1999</year>
          ). doi:
          <volume>10</volume>
          .1109/83.777088
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kutter</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>: Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation</article-title>
          .
          <source>In: Information Hiding</source>
          . pp.
          <fpage>237</fpage>
          -
          <lpage>252</lpage>
          . Springer Berlin Heidelberg (
          <year>2000</year>
          ). doi:
          <volume>10</volume>
          .1007/10719724_
          <fpage>17</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Brundick</surname>
            ,
            <given-names>F.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marvel</surname>
            ,
            <given-names>L.M.:</given-names>
          </string-name>
          <article-title>Implementation of Spread Spectrum Image Steganography</article-title>
          .
          <source>Defense Technical Information Center</source>
          (
          <year>2001</year>
          ). doi:
          <volume>10</volume>
          .21236/ada392155
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. Patent No.
          <source>: US 6</source>
          ,
          <issue>557</issue>
          ,103 B1, Int.
          <source>Cl. G06F</source>
          <volume>11</volume>
          /30. Spread Spectrum Image Steganography. (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Fan</surname>
            <given-names>Zhang</given-names>
          </string-name>
          , Bin Xu, Xinhong Zhang:
          <article-title>Digital Image Watermarking algorithm Based on CDMA Spread Spectrum</article-title>
          . In: 2006 12th
          <string-name>
            <given-names>International</given-names>
            <surname>Multi-Media Modelling</surname>
          </string-name>
          <article-title>Conference</article-title>
          .
          <source>IEEE (0)</source>
          . doi:
          <volume>10</volume>
          .1109/MMMC.
          <year>2006</year>
          .1651359
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Nguyen</surname>
          </string-name>
          , T.T.,
          <string-name>
            <surname>Taubman</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Optimal linear detector for spread spectrum based multidimensional signal watermarking</article-title>
          .
          <source>In: 2009 16th IEEE International Conference on Image Processing (ICIP)</source>
          .
          <source>IEEE</source>
          (
          <year>2009</year>
          ). doi:
          <volume>10</volume>
          .1109/ICIP.
          <year>2009</year>
          .5414121
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Nezhadarya</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Z.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ward</surname>
            ,
            <given-names>R.K.</given-names>
          </string-name>
          :
          <article-title>Image quality monitoring using spread spectrum watermarking</article-title>
          .
          <source>In: 2009 16th IEEE International Conference on Image Processing (ICIP)</source>
          .
          <source>IEEE</source>
          (
          <year>2009</year>
          ). doi:
          <volume>10</volume>
          .1109/ICIP.
          <year>2009</year>
          .5413955
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Ghosh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ray</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maity</surname>
            ,
            <given-names>S.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rahaman</surname>
          </string-name>
          , H.:
          <article-title>Spread Spectrum Image Watermarking with Digital Design</article-title>
          . In: 2009 IEEE International Advance Computing Conference. IEEE (
          <year>2009</year>
          ). doi:
          <volume>10</volume>
          .1109/IADCC.
          <year>2009</year>
          .4809129
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Altun</surname>
            ,
            <given-names>H.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Orsdemir</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharma</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bocko</surname>
            ,
            <given-names>M.F.</given-names>
          </string-name>
          :
          <article-title>Optimal Spread Spectrum Watermark Embedding via a Multistep Feasibility Formulation</article-title>
          .
          <source>IEEE Transactions on Image Processing</source>
          .
          <volume>18</volume>
          ,
          <fpage>371</fpage>
          -
          <lpage>387</lpage>
          (
          <year>2009</year>
          ). doi:
          <volume>10</volume>
          .1109/TIP.
          <year>2008</year>
          .2008222
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Samcovic</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Milovanovic</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Robust digital image watermarking based on wavelet transform and spread spectrum techniques</article-title>
          .
          <source>In: 2015</source>
          23rd
          <string-name>
            <given-names>Telecommunications</given-names>
            <surname>Forum</surname>
          </string-name>
          <article-title>Telfor (TELFOR)</article-title>
          .
          <source>IEEE</source>
          (
          <year>2015</year>
          ). doi:
          <volume>10</volume>
          .1109/TELFOR.
          <year>2015</year>
          .7377589
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Ipatov</surname>
            ,
            <given-names>V.P.</given-names>
          </string-name>
          :
          <article-title>Spread Spectrum and CDMA</article-title>
          . John Wiley &amp; Sons, Ltd (
          <year>2005</year>
          ).
          <source>doi:10.1002/0470091800</source>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <article-title>Introduction to CDMA Wireless Communications</article-title>
          .
          <source>Elsevier</source>
          (
          <year>2007</year>
          ).
          <source>doi:10.1016/b978-0- 7506-5252-0.x5001-7</source>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Gerakoulis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Geraniotis</surname>
          </string-name>
          , E.: CDMA: Access and Switching, http://dx.doi.org/10.1002/0470841699, (
          <year>2001</year>
          ).
          <source>doi:10.1002/0470841699</source>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Hara</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prasad</surname>
          </string-name>
          , R.:
          <article-title>DS-CDMA, MC-CDMA and MT-CDMA for mobile multi-media communications</article-title>
          .
          <source>In: Proceedings of Vehicular Technology Conference - VTC. IEEE (0)</source>
          . doi:
          <volume>10</volume>
          .1109/VETEC.
          <year>1996</year>
          .501483
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Agaian</surname>
            ,
            <given-names>S.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sarukhanyan</surname>
            ,
            <given-names>H.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Egiazarian</surname>
            ,
            <given-names>K.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Astola</surname>
            ,
            <given-names>J.: Hadamard</given-names>
          </string-name>
          <string-name>
            <surname>Transforms. SPIE</surname>
          </string-name>
          (
          <year>2011</year>
          ).
          <source>doi:10.1117/3</source>
          .890094
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Probability</surname>
          </string-name>
          <article-title>Theory of Bit Error Rate</article-title>
          . In:
          <article-title>Optical Bit Error Rate</article-title>
          .
          <source>IEEE</source>
          (
          <year>2009</year>
          ). doi:
          <volume>10</volume>
          .1109/9780470545430.ch7
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Korhonen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>You</surname>
          </string-name>
          , J.:
          <article-title>Peak signal-to-noise ratio revisited: Is simple beautiful?</article-title>
          <source>In: 2012 Fourth International Workshop on Quality of Multimedia Experience. IEEE</source>
          (
          <year>2012</year>
          ). doi:
          <volume>10</volume>
          .1109/QoMEX.
          <year>2012</year>
          .6263880
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <given-names>Data</given-names>
            <surname>Compression</surname>
          </string-name>
          . Springer London (
          <year>2007</year>
          ). doi:
          <volume>10</volume>
          .1007/978-1-
          <fpage>84628</fpage>
          -603-2
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Devroye</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Non-Uniform Random</surname>
          </string-name>
          Variate Generation. Springer New York (
          <year>1986</year>
          ). doi:
          <volume>10</volume>
          .1007/978-1-
          <fpage>4613</fpage>
          -8643-8
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Attari</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shirazi</surname>
            ,
            <given-names>A.A.B.</given-names>
          </string-name>
          :
          <article-title>Robust and Transparent Audio Watermarking based on Spread Spectrum in Wavelet Domain</article-title>
          .
          <source>In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)</source>
          .
          <source>IEEE</source>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1109/jeeit.
          <year>2019</year>
          .8717415
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Runovski</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmeisser</surname>
          </string-name>
          , H.:
          <article-title>On the convergence of fourier means and interpolation means</article-title>
          .
          <source>Journal of Computational Analysis and Applications</source>
          .
          <volume>6</volume>
          (
          <issue>3</issue>
          ),
          <fpage>211</fpage>
          -
          <lpage>227</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Hua</surname>
          </string-name>
          , G.:
          <article-title>Over-Complete-Dictionary-Based Improved Spread Spectrum Watermarking Security</article-title>
          .
          <source>IEEE Signal Processing Letters</source>
          .
          <volume>1</volume>
          -
          <fpage>1</fpage>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .1109/lsp.
          <year>2020</year>
          .2986154
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Chornei</surname>
            ,
            <given-names>R.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daduna</surname>
            <given-names>V.M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Knopov</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.S.</surname>
          </string-name>
          :
          <article-title>Controlled Markov Fields with Finite State Space on Graphs</article-title>
          .
          <source>Stochastic Models</source>
          .
          <volume>21</volume>
          ,
          <fpage>847</fpage>
          -
          <lpage>874</lpage>
          (
          <year>2005</year>
          ).
          <source>doi:10.1080/15326340500294520</source>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Niu</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guan</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , Zhang, S.:
          <article-title>Enhancing Image Watermarking With Adaptive Embedding Parameter and PSNR Guarantee</article-title>
          .
          <source>IEEE Transactions on Multimedia</source>
          .
          <volume>21</volume>
          ,
          <fpage>2447</fpage>
          -
          <lpage>2460</lpage>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1109/tmm.
          <year>2019</year>
          .2907475
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Bondarenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liliya</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oksana</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Inna</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Modelling instruments in risk management</article-title>
          .
          <source>International Journal of Civil Engineering and Technology</source>
          .
          <volume>10</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1561</fpage>
          -
          <lpage>1568</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Stasev</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karpenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sai</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Discrete signals with multi-level correlation function</article-title>
          .
          <source>Telecommunications and Radio Engineering</source>
          .
          <volume>71</volume>
          ,
          <fpage>91</fpage>
          -
          <lpage>98</lpage>
          (
          <year>2012</year>
          ). doi:
          <volume>10</volume>
          .1615/TelecomRadEng.v71.
          <year>i1</year>
          .
          <fpage>100</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smirnov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalchuk</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Averchev</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pastukhov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsova</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Formation of Pseudorandom Sequences with Special Correlation Properties</article-title>
          .
          <source>In: 2019 3rd International Conference on Advanced Information and Communications Technologies (AICT)</source>
          .
          <source>IEEE</source>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1109/AIACT.
          <year>2019</year>
          .8847861
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smirnov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reshetniak</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ivko</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Katkova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Generators of Pseudorandom Sequence with Multilevel Function of Correlation</article-title>
          . In: 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          .
          <source>IEEE</source>
          (
          <year>2019</year>
          ).
          <source>doi: 10.1109/PICST47496</source>
          .
          <year>2019</year>
          .9061530
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>