Robust bandlimited watermarking with trellis coded modulation

نویسندگان

  • Aria Nosratinia
  • Vimal Thilak
چکیده

Digital watermarking is equivalent to bandlimited, powerlimited digital communication. The power limit is due to the requirement of imperceptible watermarks, and has long been recognized. The bandwidth limit is due to the lowpass spectrum of images and possible lowpass attacks (malicious or unintentional). This is related to the concept of channel capacity, and has only recently been addressed in the context of watermarking. To achieve high reliability without loss of watermark data rates, we propose an adaptation of trellis coded modulation (TCM). Our method is applicable to a wide class of watermarking algorithms. The objective is to maintain the data rate while improving reliability of watermark detection, in terms of bit error rates (BER). Alternatively, higher data rates can be achieved while maintaining watermark BER. We conduct experiments for blind as well as informed detection. Simulation results show significant improvement compared to conventional methods over a wide range of channel (attack) signal-to-noise ratios.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

STEGANOGRAPHY AND DIGITAL WATERMARKING Improving the performance of RDM watermarking by means of trellis coded quantisation

We propose a method to improve the performance of the recently introduced rational dither modulation (RDM) watermarking scheme. The improvement is obtained by modifying the essentially scalar nature of RDM with the introduction of a vector quantiser. The vector quantiser is based on a properly modified version of classical trellis coded quantisation, thus leading to the new trellis-coded RDM sc...

متن کامل

Trellis coded modulation to improve dirty paper trellis watermarking

Lattice codes and quantization-based techniques have received considerable attention as a method of digital watermarking with side information. However, these algorithms are also recognized to be highly sensitive to common signal processing primitives such as valuemetric scaling, e.g. changes in volume of a song, or re-quantization, e.g. JPEG compression. Hence, it is reasonable to investigate ...

متن کامل

A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography

Information transmission and steganography p. 15 On the existence of perfect stegosystems p. 30 Towards multi-class blind steganalyzer for JPEG images p. 39 An efficient fingerprinting scheme with symmetric and commutative encryption p. 54 Collusion secure convolutional spread spectrum fingerprinting p. 67 Performance study on multimedia fingerprinting employing traceability codes p. 84 Regular...

متن کامل

Staggered Trellis Coded Modulation

A special construction method for parallel concatenated trellis coded modulation, namely staggered trellis coded modulation, is presented. This coding scheme is similar to that of the recently introduced binary laminated turbo codes and it comprises a convolutional structure due to an additional block-wise memory. The encoder and a possible decoder for this new code construction is presented an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002