Advertisement

Robustness and Efficiency of Non-linear Side-Informed Watermarking

  • Guénolé C.M. Silvestre
  • Neil J. Hurley
  • Teddy Furon
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2578)

Abstract

A number of newn on-linear watermark detectors have been proposed recently [1], [2], [3] in which the watermark detection statistic is an n th order polynomial function of the extracted vector. Coupled with a side-informed watermark embedding scheme that selects a watermark to maximise the detection output, it has been shown that hypothesis tests using such detectors are highly efficient. This paper presents further analysis of these non-linear schemes, focusing in particular on the robustness of the schemes in the presence of noise and the use of periodic filtering functions in order to reduce interference from the host signal.

Keywords

Watermark Scheme Detection Function Watermark Embedding Host Signal Audio Watermark 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    T. Furon, G. Silvestre, N. Hurley, “JANIS: Just Another N-Order Side-Informed Scheme” in Proceedings of ICIP 2002, Oct 2002. 106, 107, 109, 110Google Scholar
  2. [2]
    N. J. Hurley, G. C. M. Silvestre, “Nth Order AudioWatermarking” in Proceedings of SPIE 2022, Jan 2002. 106Google Scholar
  3. [3]
    N. J. Hurley, G. C. M. Silvestre and T. Furon, “Side-Informed Watermarking using Nth-Order Polynomial Detectors”, in Proceedings of EUSIPCO 2002, 2002. 106, 107, 110Google Scholar
  4. [4]
    I. Cox, J. Kilian, T. Leighton, and T. Shannon, “Secure spread sprectrum watermarking for multimedia,” IEEE Transactions on Image Processing 6(12), pp. 1673–1687, 1997. 106CrossRefGoogle Scholar
  5. [5]
    F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing 66(3), pp. 283–301, May 1998. 106zbMATHCrossRefGoogle Scholar
  6. [6]
    J. Eggers, J. Su, and B. Girod, “A blind watermarking scheme based on structured codebooks,” in IEE Colloquium on Secure Images and Image Authentication, pp. 41–46, (Savoy Place London), April 10 2000. 106Google Scholar
  7. [7]
    T. Furon and P. Duhamel, “An asymmetric public detection watermarking technique,” in Workshop on information hiding, (Dresden, Genmany), Oct. 2000. 106Google Scholar
  8. [8]
    T. Furon, I. Venturini, and P. Duhamel, “Unified approach of asymmetric watermarking schemes,” in Security and Watermarking of Multimedia Contents III, Proc. SPIE 4313, 22-25 January 2001. 107Google Scholar
  9. [9]
    J. Eggers, J. Su, and B. Girod, “Asymmetric watermarking schemes,” in Tagungsband des GI Workshops Sicherheit in Mediendaten, Springer Reihe: Informatik Aktuell, (Berlin, Germany), Sept. 2000. 110Google Scholar
  10. [10]
    B. Chen and G. Wornell, “Dither modulation: a newap proach to digital watermarking and information embedding,” in Security and Watermarking of Multimedia Contents, Proc. SPIE 3657, January 1999. 110Google Scholar
  11. [11]
    M. Ramkumar and A.N. Akansu, “Self-noise suppression schemes for blind image steganography”, in SPIE Multimedia Systems and Applications (Image Security) 3845, Boston, MA, Sept. 1999. 110Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Guénolé C.M. Silvestre
    • 1
  • Neil J. Hurley
    • 1
  • Teddy Furon
    • 2
  1. 1.University College DublinDublin 4Ireland
  2. 2.IRISA, INRIA, RennesFrance

Personalised recommendations