STEGANOGRAPHY AND DIGITAL WATERMARKING Improving the performance of RDM watermarking by means of trellis coded quantisation

نویسندگان

  • A. Abrardo
  • M. Barni
  • F. Pérez-González
  • C. Mosquera
چکیده

We propose a method to improve the performance of the recently introduced rational dither modulation (RDM) watermarking scheme. The improvement is obtained by modifying the essentially scalar nature of RDM with the introduction of a vector quantiser. The vector quantiser is based on a properly modified version of classical trellis coded quantisation, thus leading to the new trellis-coded RDM scheme (TC-RDM). Due to the infinite memory of the trellis TC-RDM relies on, the standard Viterbi algorithm is no longer optimum, hence we introduce a new suboptimal encoding algorithm that keeps the computational complexity reasonably low while ensuring a minimal loss with respect to the optimal scheme. The simulations we carried out on synthetic sequences show that TC-RDM permits improvement of the performance of RDM by 2–4 dB in terms of robustness against Gaussian noise addition.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trellis coded modulation to improve dirty paper trellis watermarking

Lattice codes and quantization-based techniques have received considerable attention as a method of digital watermarking with side information. However, these algorithms are also recognized to be highly sensitive to common signal processing primitives such as valuemetric scaling, e.g. changes in volume of a song, or re-quantization, e.g. JPEG compression. Hence, it is reasonable to investigate ...

متن کامل

A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography

Information transmission and steganography p. 15 On the existence of perfect stegosystems p. 30 Towards multi-class blind steganalyzer for JPEG images p. 39 An efficient fingerprinting scheme with symmetric and commutative encryption p. 54 Collusion secure convolutional spread spectrum fingerprinting p. 67 Performance study on multimedia fingerprinting employing traceability codes p. 84 Regular...

متن کامل

Journal of Mobile, Embedded and Distributed Systems, vol. II, no. 1, 2010

This paper presents the main aspects of the digital content security. It describes the content of watermarking, presenting the steganography concept. SteganoGraphy application is presented and the algorithm used is analyzed. Optimization techniques are introduces to minimize the risk of discovering the information embedded into digital content by means of invisible watermarking. Techniques of a...

متن کامل

Robust Feature-based 3D Mesh Segmentation and Visual Mask with Application to QIM 3D Watermarking

The last decade has seen the emergence of 3D meshes in industrial, medical and entertainment applications. Many researches, from both the academic and the industrial sectors, have become aware of their intellectual property protection arising with their increasing use. The context of this master thesis is related to the digital rights management (DRM) issues and more particularly to 3D digital ...

متن کامل

Algorithms for Audio Watermarking and Steganography

Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for innovation. Versatile and simple-to-use software and decreasing prices of digital devices have made it possible for consumers from all around the world to create and exchange multimedia data. Broadband Internet connections and near error-free transmission of data facil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000