Skip to main content

Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks

  • Conference paper
  • First Online:
Book cover Information Hiding (IH 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1525))

Included in the following conference series:

Abstract

Theoretical modeling of watermarks allow prediction of the detector reliability and facilitates the development of more reliable systems. In particular, mathematical evaluation is relevant to estimate the rate at which “false alarms” occur. In this paper, the probability of incorrect detection (missed detection or false alarm) is expressed in terms of the watermark-energy-to-image-luminance-variance ratio. We present some counterintuitive results which show for instance that the reliability of detection significantly depends on spatial correlation in watermark. Moreover we find that a small but uncompensated random DC component in the watermark can have a significant effect on the reliability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. I. Pitas, T. Kaskalis: “Signature Casting on Digital Images”, Proceedings IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, June 1995

    Google Scholar 

  2. W. Bender, D. Gruhl, N. Morimoto and A. Lu, “Techniques for data hiding”, IBM Systems Journal, Vol. 35. No. 3/4 1996

    Google Scholar 

  3. J.R. Smith, B. O. Comiskey, “Modulation and Information Hiding in Images”, in Proc. Workshop on Information Hiding, Univ. of Cambridge, U.K., May 30–June 1, 1996, pp. 191–201

    Google Scholar 

  4. I. Cox, J. Kilian, T. Leighton and T. Shamoon, “A secure, robust watermark for multimedia”, in Proc. Workshop on Information Hiding, Univ. of Cambridge, U.K., May 30–June 1, 1996, pp. 175–190

    Google Scholar 

  5. I.J. Cox and J.P.M.G. Linnartz, “Public Watermarks and resistance to tampering”, Presented at ICIP 97, Santa Barbara, CA, October 1997.

    Google Scholar 

  6. J.P.M.G. Linnartz, A.C.C. Kalker, G.F.G. Depovere and R. Beuker, “A reliability model for detection of electronic watermarks in digital images”, Benelux Symposium on Communication Theory, Enschede, October 1997, pp. 202–208

    Google Scholar 

  7. Ton Kalker, “Watermark Estimation Through Detector Observations”, in Proc. of the IEEE Benelux Signal Processing Symposium, 1998, Leuven, Belgium, pp. 119–122.

    Google Scholar 

  8. Ton Kalker, Jean-Paul Linnartz and Geert Depovere, “On the Reliability of detecting Electronic Watermarks in Digital Images”, acc. at Eusipco’ 98

    Google Scholar 

  9. I. J. Cox, M. L. Miller, “A review of watermarking and the importance of perceptual modeling”, Proc. of Electronic Imaging 97, Feb. 1997.

    Google Scholar 

  10. N.S. Jayant and P. Noll., “Digital Coding of waveforms” Prentice Hall, 1984.

    Google Scholar 

  11. Ch. W. Therrien, “Discrete Random Signals and Statistical Signal Processing” Prentice Hall, 1992.

    Google Scholar 

  12. “Wireless Communication, The InteractiveMultiMedia CD ROM”, Baltzer Science Publishers, Amsterdam, 2nd Edition, 1997, http://www.baltzer.nl/wirelesscd

  13. F.J. McWilliams and N.J.A. Sloane, “Pseudo-Random Sequences and arrays”, Proc. of IEEE, Vol. 64, No. 12, Dec. 1976, pp. 1715–1729

    Article  MathSciNet  Google Scholar 

  14. D. Lin and M. Liu, “Structure and Properies of Linear Recurring m-arrays”, IEEE Tr. on Inf. Th., Vol. IT-39, No. 5, Sep. 1993, pp. 1758–1762

    MATH  Google Scholar 

  15. G.R. Grimmet and D.R. Stirzaker, “Probability and Random Processes”, chapter on convergence of random variables, Oxford Science Publishers, 2nd Edition, 1992.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Linnartz, J.P., Kalker, T., Depovere, G. (1998). Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_23

Download citation

  • DOI: https://doi.org/10.1007/3-540-49380-8_23

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65386-8

  • Online ISBN: 978-3-540-49380-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics