Filters








84 Hits in 6.3 sec

Channel model for a watermark attack

Jonathan K. Su, Frank H. Hartung, Bernd Girod, Ping W. Wong, Edward J. Delp III
1999 Security and Watermarking of Multimedia Contents  
Most current techniques for embedding digital watermarks in multimedia e.g., audio, images, video, etc. are based on spread spectrum SS, although the connection is not always explicit.  ...  The re-indexing channel is shown to behave like a linear lter on average, and the optimal detector, which has linear complexity, is derived.  ...  Section 2 rst reviews a popular method for watermarking based on spread-spectrum communications and discusses the AWGN channel.  ... 
doi:10.1117/12.344666 dblp:conf/sswmc/SuHG99 fatcat:jq5lq4rtufeo3jqovbcfnduo74

Witsenhausen's Counterexample and Its Links with Multimedia Security Problems [chapter]

Pedro Comesaña, Fernando Pérez-González, Chaouki T. Abdallah
2012 Lecture Notes in Computer Science  
watermarking detection.  ...  Witsenhausen's counterexample was proposed more than four decades ago in order to show that affine control strategies are not optimal for systems with non-classical information patterns.  ...  The multidimensional version of this embedding strategy has been used for a long time in watermarking, both for detection and decoding problems, where it is known as Multiplicative Spread-Spectrum.  ... 
doi:10.1007/978-3-642-32205-1_38 fatcat:x6spzadusfd4jfj7dl7ycmb46q

Time-Frequency Analysis and Its Application in Digital Watermarking

Srdjan Stanković
2010 EURASIP Journal on Advances in Signal Processing  
This approach is presented in the multidimensional form and then applied to digital audio, digital image, and digital video watermarking.  ...  In particular, the method that maps time-frequency characteristics of a host signal to the pseudo noise watermark sequence is thoroughly discussed.  ...  Irena Orović and Professor Victor Sučić for their help and useful suggestions during the work on this paper.  ... 
doi:10.1155/2010/579295 fatcat:apqn6z54krgqjazhlwc7f6nata

Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques [chapter]

Marcos de Castro Pacitti, Weiler Alves Finamore
2005 Lecture Notes in Computer Science  
New M -ary unidimensional and multidimensional Spread Spectrum based modulation techniques are introduced, including their improved forms.  ...  Therefore, performance bounds for uncoded techniques are an important tool for coded system optimization, aiming at operation close to capacity.  ...  Then on Section V new M -ary unidimensional and multidimensional Spread Spectrum based modulation techniques are introduced, their performances are evaluated, and the performance lower bounds for these  ... 
doi:10.1007/11551492_31 fatcat:j7pxpkcymvhirbia6rjtfwzrsm

A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication

Chuhong Fei, R.H. Kwong, D. Kundur
2009 IEEE Transactions on Information Forensics and Security  
Our results demonstrate that quantization-based watermarking is more appropriate than spread-spectrum-based methods to achieve the semifragility tradeoff between two error probabilities.  ...  The results of this paper show that our approach provides insights for authentication watermarking and allows for better control of semifragility in specific applications.  ...  Equation (21) gives the best authentication detector structure for spread-spectrum watermarking, which is a distance detector to the embedded watermark.  ... 
doi:10.1109/tifs.2009.2015039 fatcat:7w6nhvhxzjb37n57s3xujpinxi

A Set Theoretic Framework for Watermarking and Its Application to Semifragile Tamper Detection

Oktay Altun, Gaurav Sharma, Mehmet Celik, Mark Bocko
2006 IEEE Transactions on Information Forensics and Security  
These are 8-b gray-scale images with a size of 512 512 pixels For the spread-spectrum watermark signal , we utilize for the USC and Kodak images, and 1024 1024 for the Aerial  ...  The optimal to compression, semifragile watermark, set theoretic water- transform domain watermark embedding method is a good ex- marking, spread-spectrum watermark, tamper localization  ... 
doi:10.1109/tifs.2006.885018 fatcat:37suyvy33nhoncaxw65ezljtou

Optimal Detector for Multiplicative Watermarks Embedded in the DFT Domain of Non-White Signals

Vassilios Solachidis, Ioannis Pitas
2004 EURASIP Journal on Advances in Signal Processing  
The analysis performed involves theoretical evaluation of the statistics of the Fourier coefficients and the design of an optimal detector for multiplicative watermark embedding.  ...  This paper deals with the statistical analysis of the behavior of a blind robust watermarking system based on pseudorandom signals embedded in the magnitude of the Fourier transform of the host data.  ...  Many approaches adopt principles from spread spectrum communications in their watermarking system model [1, 2, 8, 21] .  ... 
doi:10.1155/s1110865704408014 fatcat:yvy5mnapyff4viwqve2vtd44ia

On the Need for Signal-Coherent Watermarks

G. Doerr, J.-L. Dugelay, D. Kirovski
2006 IEEE transactions on multimedia  
Digital watermarking has been introduced in the 90's as a complementary technology for copyright protection.  ...  In this paper, we present a generic attack strategy based on block replacement.  ...  For example, one large class of such correlators are matched filters used in spread-spectrum watermarking [3] , [22] .  ... 
doi:10.1109/tmm.2006.879917 fatcat:mxoz6ljf7bbynlqhlgliitpeua

Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images

J.R. Hernandez, F. Perez-Gonzalez, J.M. Rodriguez, G. Nieto
1998 IEEE Journal on Selected Areas in Communications  
In this paper a watermarking scheme for copyright protection of still images is modeled and analyzed.  ...  In this scheme a signal following a key-dependent two-dimensional multipulse modulation is added to the image for ownership enforcement purposes.  ...  In [1] , a watermarking procedure based on spread spectrum (SS) techniques is proposed for application to multimedia data.  ... 
doi:10.1109/49.668974 fatcat:uutijpf6q5byjlhrv4ooip3mom

How to Combat Block Replacement Attacks? [chapter]

Gwenaël Doërr, Jean-Luc Dugelay
2005 Lecture Notes in Computer Science  
Such an attacking strategy has been recognized to be a major threat against watermarking systems e.g. additive spread-spectrum and quantization index modulation algorithms.  ...  This can be achieved by imposing a linear structure on the watermark in a feature space e.g. the Gabor space.  ...  Future work will explore how former works [11, 27] can be used to design a blind detector for signal coherent watermarks.  ... 
doi:10.1007/11558859_13 fatcat:scuaijxom5ab3omxlybjqbxb44

Performance analysis of existing and new methods for data hiding with known-host information in additive channels

F. Perez-Gonzalez, F. Balado, J.R. Hernandez Martin
2003 IEEE Transactions on Signal Processing  
that make use of near-optimal ML decoding; the comparison is based on measuring their probabilities of decoding error in the presence of channel distortions.  ...  With the objective of filling a gap in the literature, this paper supplies a fair comparison between significant representatives of both this family of methods and the former spread-spectrum approaches  ...  Eggers, for kindly reading and discussing the manuscript and providing valuable suggestions; Pedro Comesaña, for helping with some simulations, and the anonymous reviewers for their constructive comments  ... 
doi:10.1109/tsp.2003.809368 fatcat:lroy3d7jerfc7a6rslxa3242t4

Robust Watermarking Algorithm against the Geometric Attacks based on Non-Subsampled Shearlet Transform and Harris-Laplace Detector

Ling Zhou, Mei-Juan Zuo, Hao Shi, Ye Zhang, Li-Hua Gong
2022 Security and Communication Networks  
A robust watermarking algorithm against geometric attacks based on the non-subsampled shearlet transform and the Harris-Laplace detector is proposed.  ...  With the rapid spread of network information, the information maintenance has become the focus of information security on networks.  ...  However, when the wavelet transform is utilized to represent high-dimensional signals, it not only lacks directional sensitivity, but also cannot capture the linear singularity of high-dimensional signals  ... 
doi:10.1155/2022/7605595 doaj:03b21b4bd3a5468e985b30ed22d1d9df fatcat:emsujyoojvfwvcdg6rybzmmqtm

Improving DFT-Based Image Watermarking Using Particle Swarm Optimization Algorithm

Manuel Cedillo-Hernandez, Antonio Cedillo-Hernandez, Francisco J. Garcia-Ugalde
2021 Mathematics  
In this context, this paper proposes an improved robust watermarking algorithm in discrete Fourier transform via spread spectrum, optimizing the key operation parameters, particularly the amounts of bands  ...  In general terms, robust watermarking conceals a small signal called a "watermark" in a host image in a form imperceptible to human vision.  ...  the 2D DFT-based watermarking that employs spread spectrum modulation DS-CDMA.  ... 
doi:10.3390/math9151795 fatcat:mzlgqemxynairhmqhg5crsbgem

2011 Index IEEE Transactions on Information Forensics and Security Vol. 6

2011 IEEE Transactions on Information Forensics and Security  
., +, TIFS March 2011 202-212 Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding.  ...  ., +, TIFS Sept. 2011 883-893 Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding.  ... 
doi:10.1109/tifs.2011.2176153 fatcat:i2wz3suxbnemvbinhkvjwesq2y

Exploiting self-similarities to defeat digital watermarking systems

Gwenaël Doërr, Jean-Luc Dugelay, Lucas Grangé
2004 Proceedings of the 2004 multimedia and security workshop on Multimedia and security - MM&Sec '04  
Unauthorized digital copying is a major concern for multimedia content providers.  ...  It should consequently be possible to exploit the self-similarities of the signal to replace each signal block with another perceptually similar one.  ...  Watermarking Scheme A basic additive spread spectrum watermark has been considered during the experiments.  ... 
doi:10.1145/1022431.1022455 dblp:conf/mmsec/DoerrDG04 fatcat:xjzsja6h6rcw7ciosvoc6skvdm
« Previous Showing results 1 — 15 out of 84 results