Performance analysis and improvement of dither modulation under the composite attacks

نویسندگان

  • Xinshan Zhu
  • Jie Ding
چکیده

The first goal of this article is to analyze the performance of dither modulation (DM) against the composite attacks including valumetric scaling, additive noise and constant change. The analyzes are developed under the assumptions that the host vector and noise vector are mutually independent and both of them have independently and identically distributed components. We derive the general expressions of the probability density functions of several concerned signals and the decoding error probability. The specific theoretical results are provided for the case of generalized Gaussian host and noise. Based on the analyzes, the performance of DM is predicted for different scenarios with a high degree of accuracy and evaluated for different distribution models of host and noise signals. Numerical simulations confirm the validity of the given theoretical analyzes. Then, we address to improve the robustness of DM against valumetric scaling plus constant change. The normalized dither modulation (NDM) is presented, which works by constructing a gain-invariant vector with zero mean for quantization. Performance analysis shows that NDM is theoretically invariant to valumetric scaling and constant change and achieves similar performance to DM in other aspects. The performance of NDM is further improved by weighting the quantization errors. Experiments on real images also show the advantage of NDM over DM subject to amplitude scaling and constant change.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Analysis of Dither Modulation against Composite Attacks

In this paper, we analyze the performance of dither modulation (DM) against the composite attacks including valumetric scaling, additive noise and constant change. The analyses are developed under the assumptions that the host vector and noise vector are mutually independent and both of them have independently and identically distributed components. We derive the general expressions of the prob...

متن کامل

Provably robust digital watermarking

Copyright notification and enforcement, authentication, covert communication, and hybrid transmission are examples of emerging multimedia applications for digital watermarking methods, methods for embedding one signal (e.g., the digital watermark) within another “host” signal to form a third, “composite” signal. The embedding is designed to achieve efficient trade-offs among the three conflicti...

متن کامل

Robustness improvement of known-host-state watermarking using host statistics

In this paper we consider the problem of performance improvement of known-host-state (quantization-based) watermarking methods undergo Additive White Gaussian noise (AWGN) and uniform noise attacks. We question the optimality of uniform high-rate quantizer based design of Dither Modulation and Distortion Compensated Dither Modulation methods from their robustness to these attacks point of view ...

متن کامل

Robustness improvement of known-host-state data-hiding using host statistics

In this paper we considered the problem of performance improvement of known-host-state (quantization-based) watermarking methods undergo additive white Gaussian noise (AWGN) and uniform noise attacks. We question the optimality of uniform high rate quantizer based design of dither modulation and distortion compensate dither modulation methods from their robustness to these attacks point of view...

متن کامل

Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia

Copyright notification and enforcement, authentication, covert communication, and hybrid transmission applications such as digital audio broadcasting are examples of emerging multimedia applications for digital watermarking and information embedding methods, methods for embedding one signal (e.g., the digital watermark) within another “host” signal to form a third, “composite” signal. The embed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EURASIP J. Adv. Sig. Proc.

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012