Practical Capacity of Digital Watermark as Constrained by Reliability

نویسنده

  • Ryo Sugihara
چکیده

This paper presents a theoretic analysis of watermark capacity. First, a simplified watermark scheme is postulated. In the scheme, detection yields a multidimensional vector, in which each dimension is assumed to be i.i.d. (independent and identically distributed) and follow the Gaussian distribution. The major constraint on the capacity is detection reliability, which is one of the most important measures of the utility of watermarks. The problem is to figure out the maximum amount of information payload with the reliability requirement still satisfied. The reliability is represented by three kinds of error rates: the false positive error rate, the false negative error rate, and the bit error rate. These error rates are formulated under certain assumptions, and the theoretical capacity can be determined by setting the bounds on all of the error rates. Further, experiments were performed to verify the theoretic analysis, and it was shown that this approach yields a good estimate of the capacity of a watermark.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digital Watermarking Facing Attacks by Amplitude Scaling and Additive White Noise

Digital watermarking is a technology which potentially can be used to enforce the copyrights and integrity of digital multimedia data. In this paper, a communications perspective on digital watermarking is used to compute upper performance limits on blind digital watermarking for simple AWGN attacks and attacks by amplitude scaling and additive white noise. We show that the latter case can be t...

متن کامل

A reliability engineering approach to digital watermark evaluation

Robust watermarks are evaluated in terms of image fidelity and robustness. We extend this framework and apply reliability testing to robust watermark evaluation. Reliability is the probability that a watermarking algorithm will correctly detect or decode a watermark for a specified fidelity requirement under a given set of attacks and images. In reliability testing, a system is evaluated in ter...

متن کامل

Robust bandlimited watermarking with trellis coded modulation

Digital watermarking is equivalent to bandlimited, powerlimited digital communication. The power limit is due to the requirement of imperceptible watermarks, and has long been recognized. The bandwidth limit is due to the lowpass spectrum of images and possible lowpass attacks (malicious or unintentional). This is related to the concept of channel capacity, and has only recently been addressed ...

متن کامل

Nested Digital Image Watermarking Technique Using Blowfish Encryption Algorithm

Digital watermarking is referred to a method used for copyright protection and authentication. In this paper, we present a method of nested digital watermark embedding and extraction in which a nested watermark (a watermark inside another watermark) is embedded into the main image. This concept of nested watermarking is used to increase the watermark embedding capacity. In this method, a waterm...

متن کامل

Digital Watermarking Technology in Different Domains

Due to high speed computer networks, the use of digitally formatted data has increased many folds.The digital data can be duplicated and edited with great ease which has led to a need for effectivecopyright protection tools. Digital Watermarking is a technology of embedding watermark withintellectual property rights into images, videos, audios and other multimedia data by a certainalgorithm .Di...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001