1 %STC_EXTRACT Extracts message from stego bit-string produced by STC_EMBED.
\r
3 % MSG = STC_EXTRACT(Y, M) extracts M message bits into MSG from stego
\r
4 % bit-string Y. Use Syndrome-Trellis Codes with constraint height 10.
\r
6 % MSG = STC_EXTRACT(Y, M, H) same as above, but uses STC of constraint
\r
7 % height H. H must be the same as used for embedding.
\r
10 % Y - vectors of type uint8
\r
11 % H - scalar between 6 and 15 (a higher number means bigger efficiency
\r
12 % but longer embedding time), default is 10.
\r
14 % Use STC_EMBED(...) to embed the message.
\r
18 % STC Toolbox website: http://dde.binghamton.edu/filler/stc
\r
21 % [1] T. Filler, J. Judas, J. Fridrich, "Minimizing Additive Distortion in
\r
22 % Steganography using Syndrome-Trellis Codes", submitted to IEEE
\r
23 % Transactions on Information Forensics and Security, 2010.
\r
24 % http://dde.binghamton.edu/filler/pdf/Fill10tifs-stc.pdf
\r
26 % [2] T. Filler, J. Judas, J. Fridrich, "Minimizing Embedding Impact in
\r
27 % Steganography using Trellis-Coded Quantization", Proc. SPIE,
\r
28 % Electronic Imaging, Media Forensics and Security XII, San Jose, CA,
\r
29 % January 18-20, 2010.
\r
30 % http://dde.binghamton.edu/filler/pdf/Fill10spie-syndrome-trellis-codes.pdf
\r
32 % [3] T. Filler, J. Fridrich, "Minimizing Additive Distortion Functions
\r
33 % With Non-Binary Embedding Operation in Steganography", 2nd IEEE
\r
34 % Workshop on Information Forensics and Security, December 2010.
\r
35 % http://dde.binghamton.edu/filler/pdf/Fill10wifs-multi-layer-stc.pdf
\r
37 % See also STC_EMBED, STC_PM1_PLS_EMBED, STC_PM1_DLS_EMBED,
\r
38 % STC_PM2_PLS_EMBED, STC_PM2_DLS_EMBED.
\r