1 %STC_ML_EXTRACT Extracts message embedded by ML-STCs.
\r
2 % MSG = STC_ML_EXTRACT(Y, NUM_MSG_BITS) extracts the embedded message
\r
3 % from stego sequence Y. Array NUM_MSG_BITS describes how many bits to
\r
4 % extract from each layer of LSB. Uses default constraint height h=10.
\r
6 % MSG = STC_ML_EXTRACT(Y, NUM_MSG_BITS, H) does the same as above, but
\r
7 % constraint height of the STC is H.
\r
9 % Author: Tomas Filler email: tomas.filler@gmail.com
\r
10 % www: http://dde.binghamton.edu/filler
\r
12 % STC Toolbox website: http://dde.binghamton.edu/filler/stc
\r
15 % [1] T. Filler, J. Judas, J. Fridrich, "Minimizing Additive Distortion in
\r
16 % Steganography using Syndrome-Trellis Codes", submitted to IEEE
\r
17 % Transactions on Information Forensics and Security, 2010.
\r
18 % http://dde.binghamton.edu/filler/pdf/Fill10tifs-stc.pdf
\r
20 % [2] T. Filler, J. Judas, J. Fridrich, "Minimizing Embedding Impact in
\r
21 % Steganography using Trellis-Coded Quantization", Proc. SPIE,
\r
22 % Electronic Imaging, Media Forensics and Security XII, San Jose, CA,
\r
23 % January 18-20, 2010.
\r
24 % http://dde.binghamton.edu/filler/pdf/Fill10spie-syndrome-trellis-codes.pdf
\r
26 % [3] T. Filler, J. Fridrich, "Minimizing Additive Distortion Functions
\r
27 % With Non-Binary Embedding Operation in Steganography", 2nd IEEE
\r
28 % Workshop on Information Forensics and Security, December 2010.
\r
29 % http://dde.binghamton.edu/filler/pdf/Fill10wifs-multi-layer-stc.pdf
\r
31 % See also STC_PM1_PLS_EMBED, STC_PM1_DLS_EMBED, STC_PM2_PLS_EMBED
\r
32 % STC_PM2_DLS_EMBED, STC_EMBED, STC_EXTRACT.
\r