On Channel Capacity and Modulation of Watermarks in Digital Still Images
An adversary who knows a watermarking scheme can extract the watermarked coefficients and attack them directly. This situation can be understood in a similar way to jamming as known from military communications and system performance can be described in terms of channel capacity and distortion. Using a gradient method, the attack is optimized from the adversary’s viewpoint by minimizing channel capac- ity. It turns out that then for the same level of distortion and equiproba- ble modulation symbols binary modulation can achieve a higher channel capacity than modulation alphabets of larger size.
KeywordsCopyright protection Watermarking Fingerprinting Jamming Channel Capacity Modulation
Unable to display preview. Download preview PDF.
- 4.B. Tao, B. Dickinson: Adaptive Watermarking in the DCT Domain. Proc. Int. Conf. Accoustics, Speech, Signal Processing, 1997Google Scholar
- 5.C.I. Podilchuk, W. Zeng: Perceptual Watermarking of Still Images. Proc. First IEEE Signal Processing Society Workshop on Multimedia Signal Processing, June 1997, Princeton, New JerseyGoogle Scholar
- 6.B. Girod: The Information Theoretical Significance of Spatial and Temporal Masking in Video Signals. Proceedings of the SPIE, Human Vision, Visual Processing, and Digital Display, vol. 1077, pp. 178–187, 1989Google Scholar
- 9.J. Löfvenberg, N. Wiberg: Random Codes for Digital Fingerprinting. Proc. ISIT’ 98, Cambridge, MA, USA, Aug. 16–21, 1998, p. 80Google Scholar
- 10.J. Kilian, F.T. Leighton, L.R. Matheson, T.G. Shamoon, R.E. Tarjan, F. Zane: Resistance of Digital Watermarks to Collusive Attacks. Proc. ISIT’;98, Cambridge, MA, USA, Aug. 16–21, 1998, p. 271Google Scholar
- 12.J.G. Proakis: Digital Communications. Third edition, McGraw-Hill, 1995Google Scholar
- 13.W.B. Pennebaker, J.L. Mitchell: JPEG Still Image Data Compression Standard. Chapman & Hall, New York, 1993Google Scholar