Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks

نویسندگان

  • Pedro Comesaña Alfaro
  • Neri Merhav
  • Mauro Barni
چکیده

The problem of optimum watermark embedding and detection was addressed in a recent paper by Merhav and Sabbag, where the optimality criterion was the maximum false–negative error exponent subject to a guaranteed false– positive error exponent. In particular, Merhav and Sabbag derived universal asymptotically optimum embedding and detection rules under the assumption that the detector relies solely on second order joint empirical statistics of the received signal and the watermark. In the case of a Gaussian host signal and a Gaussian attack, however, closed–form expressions for the optimum embedding strategy and the false–negative error exponent were not obtained in that work. In this paper, we derive such expressions, again, under the universality assumption that neither the host variance nor the attack power are known to either the embedder or the detector. The optimum embedding rule turns out to be very simple and with an intuitively–appealing geometrical interpretation. The improvement with respect to existing sub–optimum schemes is demonstrated by displaying the optimum false–negative error exponent as a function of the guaranteed false–positive error exponent. Index Terms Watermarking, watermark embedding, watermark detection, hypothesis testing, Neyman–Pearson. P. Comesaña is with the Signal Theory and Communications Department, University of Vigo, Campus Lagoas-Marcosende, Vigo 36310, Spain, (phone: +34 986 812683, fax: +34 986 812116, e-mail: [email protected]), N. Merhav is with the Department of Electrical Engineering, Technion – I.I.T., Haifa 32000, Israel, (phone/fax: +972-4-8294737, e-mail: [email protected]), M. Barni is with the Department of Information Engineering, University of Siena, Via Roma 56, Siena 53100, Italy, (phone: +39 0577 234624 / +39 0577 234621, fax: +39 0577 233630, e-mail: [email protected]). This work was partially supported by the Italian Ministry of Research and Education under FIRB project no. RBIN04AC9W. December 21, 2013 DRAFT

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks

The problem of asymptotically optimum watermark detection and embedding has been addressed in a recent paper by Merhav and Sabbag where the optimality criterion corresponds to the maximization of the false negative error exponent for a fixed false positive error exponent. In particular Merhav and Sabbag derive the optimum detection rule under the assumption that the detector relies on the secon...

متن کامل

Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling

This paper investigates the multiplicative spread spectrum watermarking method for the image. The information bit is spreaded into middle-frequency Discrete Cosine Transform (DCT) coefficients of each block of an image using a generated pseudo-random sequence. Unlike the conventional signal modeling, we suppose that both signal and noise are distributed with Laplacian distribution, because the ...

متن کامل

Error exponents for one-bit watermarking

Quantization index modulation (QIM) is a powerful hostinterference rejecting method for data hiding. This paper applies QIM to one-bit watermarking and proposes a simple but powerful watermark detector. We derive lower bounds on the error exponents for the detector under a quadratic distortion constraint for the watermarker and additive white Gaussian noise attacks. These bounds are independent...

متن کامل

On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems

A public multiple-access digital watermarking system is studied, in which two correlated Gaussian covertexts are watermarked independently and then sent to one authorized receiver via memoryless Gaussian attack channels. Given two distortion level pairs (D1,D2) and (D′ 1,D ′ 2) with respect to the average squared error distortion measure, an achievable region is given in single-letter informati...

متن کامل

Preprocessed and postprocessed quantization index modulation methods for digital watermarking

Quantization index modulation (QIM) methods, a class of digital watermarking and information embedding methods, achieve very e cient trade-o s among the amount of embedded information (rate), the amount of embedding-induced distortion to the host signal, and the robustness to intentional and unintentional attacks. For example, we show that against independent additive Gaussian attacks, which ar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0803.3880  شماره 

صفحات  -

تاریخ انتشار 2008