Skip to main content

Adaptive Threshold Based Robust Watermark Detection Method

  • Conference paper
  • 1724 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5450))

Abstract

In this paper, we propose a novel blind watermark detector based on channel estimation and adaptive threshold scheme to enhance the robustness of watermarking system. There are channel estimation based blind detectors in the literature. These detectors use reference watermarks to estimate degradations and information watermarks to send the hidden data. As in all estimation problems, however, unreliable estimates may deteriorate detection capability of the system. We employ adaptive threshold scheme to remedy these problems. First, we estimate the raw reliability scores of the watermark channels by using reference watermarks. Then, we transform the raw reliability scores by employing min-max method and logistic function respectively. Hence, we get the channel parameters of the watermark channels. Finally, the information watermark is recovered by using the extracted watermarks and their corresponding channel parameters. The simulations demonstrate that the proposed detector is more robust than existing detectors against various degradations and malicious attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing 6, 1673–1687 (1997)

    Article  Google Scholar 

  2. Hernandez, J.R., Amado, M., Perez-Gonzalez, F.: DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure. IEEE Trans. on Image Processing 9, 55–68 (2000)

    Article  Google Scholar 

  3. Perez-Gonzalez, F., Amado, M., Hernandez, J.R.: Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels. IEEE Trans. on Signal Processing 51, 960–980 (2003)

    Article  MathSciNet  Google Scholar 

  4. Briassouli, A., Tsakalides, P.: Hidden Messages in Heavy Tails: DCT-Domain Watermark Detection Using Alpha-Stable Models. IEEE Trans. on Multimedia 7, 700–715 (2005)

    Article  Google Scholar 

  5. Kundur, D., Hatzinakos, D.: Digital Watermarking using Multiresolution Wavelet Decomposition. In: Proc. IEEE Int. Conf. On Acoustics, Speech and Signal Processing, Seattle, Washington, May 1998, vol. 5, pp. 2969–2972 (1998)

    Google Scholar 

  6. Kundur, D., Hatzinakos, D.: Diversity and Attack Characterization for Improved Robust Watermarking. IEEE Trans. on Image Processing 49, 2383–2396 (2001)

    Article  Google Scholar 

  7. Huber, P.J.: Robust Statistics. Wiley, Chichester (1981)

    Book  MATH  Google Scholar 

  8. Petitcolas, F.A.P., Anderson, R.J.: Evaluation of copyright marking systems. In: Proc. IEEE Multimedia Systems 1999, Florence, Italy, June 7-11, vol. 1, pp. 574–579 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karabat, C. (2009). Adaptive Threshold Based Robust Watermark Detection Method. In: Kim, HJ., Katzenbeisser, S., Ho, A.T.S. (eds) Digital Watermarking. IWDW 2008. Lecture Notes in Computer Science, vol 5450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04438-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04438-0_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04437-3

  • Online ISBN: 978-3-642-04438-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics