Advertisement

Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation

  • Fernando Pérez-González
  • Félix Balado
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2578)

Abstract

A considerable amount of attention has been lately paid to a number of data hiding methods based on quantization, seeking to achieve in practice the results predicted by Costa for a channel with side information at the encoder. In this paper we analyze a multidimensional extension of the implementation of Costa’s result known as DC-QIM. The presented analysis is based on measuring the probabilities of decoding error in the presence of two important kinds of additive channel distortions. DC-QIM is able to achieve a probability of decoding error of less than 1e-02 for 0 dB of watermark to noise ratio and only 20 samples per hidden bit. Empirical results supporting our analysis are given both for synthetic data and real images.

Keywords

Decision Region Data Hiding Accurate Approach Watermark Signal Quantization Index Modulation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Norman C. Beaulieu. An infinite series for the computation of the complementary probability distribution function of a sum of independent random variables and its application to the sum of Rayleigh random variables. IEEE Trans. Commun., 38(9):1463–1474, September 1990. 98, 104, 105CrossRefGoogle Scholar
  2. [2]
    Norman C. Beaulieu and Adnan A. Abu-Dayya. Analysis of equal gain diversity on Nakagami fading channels. IEEE Trans. Commun., 39(2):225–234, February 1991. 98CrossRefGoogle Scholar
  3. [3]
    Hugh Brunk. Quantizer characteristics important for quantization index modulation. In Ping WahWong and Edward J. Delp, editors, Security and Watermarking of Multimedia Contents III, volume 4314of Proc. of SPIE, pages 686–694, San José, USA, January 2001. 88Google Scholar
  4. [4]
    K.V. Bury. Statistical Models in Applied Science. Robert E. Krieger Publishing Company, Malabar, Florida, 1975. 96Google Scholar
  5. [5]
    J. J. Chae, D. Mukherjee, and B. S. Manjunath. A robust data hiding technique using multidimensional lattices. In Procs. of the IEEE Forum on Research and Technology Advances in Image Processing, pages 319–326, Santa Bárbara, USA, April 1998. 88Google Scholar
  6. [6]
    J. J. Chae, D. Mukherjee, and B. S. Manjunath. Color image embedding using multidimensional lattice structures. In Procs. of the IEEE Intnal. Conference on Image Processing (ICIP’98), volume 1, pages 460–464, Chicago, USA, October 1998. 88Google Scholar
  7. [7]
    Brian Chen and Gregory W. Wornell. Provably robust digital watermarking. In Proc. of SPIE, volume 3845of Multimedia Systems and Applications II, pages 43–54, San José, USA, 1999. 87Google Scholar
  8. [8]
    Brian Chen and Gregory W. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory, 47(4):1423–1443, May 2001. 87, 88, 91, 94, 98, 102zbMATHCrossRefMathSciNetGoogle Scholar
  9. [9]
    J.H. Conway and N. J.A. Sloane. Sphere Packings, Lattices and Groups, volume 290 of Comprehensive Studies in Mathematics. Springer, 3rd edition, 1999. 88, 92, 93Google Scholar
  10. [10]
    Max H.M. Costa. Writing on dirty paper. IEEE Trans. on Information Theory, 29(3):439–441, May 1983. 87zbMATHCrossRefGoogle Scholar
  11. [11]
    Joachim J. Eggers, Jonathan K. Su, and Bernd Girod. A blind watermarking scheme based on structured codebooks. In Proc. of IEE Conf. on Secure Images and Image Authentication, London, UK, April 2000. 87, 88, 91Google Scholar
  12. [12]
    Juan R. Hernández, Martín Amado, and Fernando Pérez-González. DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans. on ImageáProcessing, 9(1):55–68, January 2000. Special Issue on Image and Video Processing for Digital Libraries. 89CrossRefGoogle Scholar
  13. [13]
    Juan R. Hernández, Fernando Pérez-González, and José M. Rodríguez. Coding and synchronization: A boost and a bottleneck for the development of image watermarking. In Proc. of the COST #254 Int. Workshop on Intelligent Communications, pages 77–82, L’Aquila, Italy, June 1998. SSGRR. 90, 99Google Scholar
  14. [14]
    Pierre Moulin and M. Kivanç Míhçak. The data hiding capacity of image sources. June 2001. 89Google Scholar
  15. [15]
    Pierre Moulin and Joseph A. O’Sullivan. Information-theoretic analysis of information hiding. January 2001. 91Google Scholar
  16. [16]
    Fernando Pérez-González, Félix Balado, and Juan R. Hernández. Performance analysis of existing and new methods for data hiding with known host information in additive channels. November 2001. Submitted to IEEE Transactions on Signal Processing. 88, 93, 102, 105Google Scholar
  17. [17]
    Sviatoslav Voloshynovskiy, Alexander Herrigel, Nazanin Baumgärtner, and Thierry Pun. A stochastic approach to content adaptive digital image watermarking. In 3rd International Workshop on Information Hiding, Desden, Germany, October 1999. Springer-Verlag. 89Google Scholar
  18. [18]
    Sviatoslav Voloshynovskiy, Shelby Pereira, Alexander Herrigel, Nazanin Baumgärtner, and Thierry Pun. Generalized watermark attack based on watermark estimation and perceptual remodulation. In Ping Wah Wong and Edward J. Delp, editors, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, volume 3971 of SPIE Proceedings, San José, USA, January 00. 91Google Scholar
  19. [19]
    Raymond B. Wolfgang, Christine I. Podilchuk, and Edward J. Delp. Perceptual watermarks for digital images and video. Proceedings of the IEEE, 87(7):1108–1125, July 1999. 89.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Fernando Pérez-González
    • 1
  • Félix Balado
    • 1
  1. 1.Dept. Tecnologías de las ComunicacionesETSI Telecom University of VigoVigoSpain

Personalised recommendations