Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks
نویسندگان
چکیده
Calculation of watermarking capacities of private Laplacian watermarking systems with the magnitude-error distortion measure under fixed attacks is addressed. First, in the case of an additive Laplacian attack, a nice closed-form formula for the watermarking capacities is derived, which involves only the distortion level and the parameter of the Laplacian attack. Second, in the case of an arbitrary additive attack, a general, but slightly more complicated formula for the watermarking capacities is given. Finally, calculation of the joint compression and private watermarking rate region of Laplacian watermarking systems with an additive Laplacian attack is considered.
منابع مشابه
A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography
Information transmission and steganography p. 15 On the existence of perfect stegosystems p. 30 Towards multi-class blind steganalyzer for JPEG images p. 39 An efficient fingerprinting scheme with symmetric and commutative encryption p. 54 Collusion secure convolutional spread spectrum fingerprinting p. 67 Performance study on multimedia fingerprinting employing traceability codes p. 84 Regular...
متن کاملError exponents for one-bit watermarking
Quantization index modulation (QIM) is a powerful hostinterference rejecting method for data hiding. This paper applies QIM to one-bit watermarking and proposes a simple but powerful watermark detector. We derive lower bounds on the error exponents for the detector under a quadratic distortion constraint for the watermarker and additive white Gaussian noise attacks. These bounds are independent...
متن کاملQuantization index modulation: A class of provably good methods for digital watermarking and information embedding
We consider the problem of embedding one signal (e.g., a digital watermark), within another “host” signal to form a third, “composite” signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing information-embedding rate, minimizing distortion between the host signal and composite signal, and maximizing the robustness of the embedding. We in...
متن کاملJoint Source–Channel Coding Excess Distortion Exponent for Some Memoryless Continuous-Alphabet Systems
We investigate the joint source–channel coding (JSCC) excess distortion exponent (the exponent of the probability of exceeding a prescribed distortion level) for some memoryless communication systems with continuous alphabets. We first establish upper and lower bounds for for systems consisting of a memoryless Gaussian source under the squared-error distortion fidelity criterion and a memoryles...
متن کاملQuantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia
Copyright notification and enforcement, authentication, covert communication, and hybrid transmission applications such as digital audio broadcasting are examples of emerging multimedia applications for digital watermarking and information embedding methods, methods for embedding one signal (e.g., the digital watermark) within another “host” signal to form a third, “composite” signal. The embed...
متن کامل