Performance Analysis of Dither Modulation against Composite Attacks
نویسندگان
چکیده
In this paper, we analyze the performance of dither modulation (DM) against the composite attacks including valumetric scaling, additive noise and constant change. The analyses are developed under the assumptions that the host vector and noise vector are mutually independent and both of them have independently and identically distributed components. We derive the general expressions of the probability density functions of several concerned signals and the decoding error probability. The specific analytical results are presented for the case of generalized Gaussian host signal. Numerical simulations confirm the validity of the given theoretical analyses.
منابع مشابه
Performance analysis and improvement of dither modulation under the composite attacks
The first goal of this article is to analyze the performance of dither modulation (DM) against the composite attacks including valumetric scaling, additive noise and constant change. The analyzes are developed under the assumptions that the host vector and noise vector are mutually independent and both of them have independently and identically distributed components. We derive the general expr...
متن کاملProvably robust digital watermarking
Copyright notification and enforcement, authentication, covert communication, and hybrid transmission are examples of emerging multimedia applications for digital watermarking methods, methods for embedding one signal (e.g., the digital watermark) within another “host” signal to form a third, “composite” signal. The embedding is designed to achieve efficient trade-offs among the three conflicti...
متن کاملQuantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia
Copyright notification and enforcement, authentication, covert communication, and hybrid transmission applications such as digital audio broadcasting are examples of emerging multimedia applications for digital watermarking and information embedding methods, methods for embedding one signal (e.g., the digital watermark) within another “host” signal to form a third, “composite” signal. The embed...
متن کاملDither Modulation in the Logarithmic Domain
Abstract. Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ruining the performance of the watermarking system with almost non perceptually altering the watermarked signal. In this paper we propose a new family of quantizationbased methods, based on both Dither Modulation and Sp...
متن کاملPreprocessed and postprocessed quantization index modulation methods for digital watermarking
Quantization index modulation (QIM) methods, a class of digital watermarking and information embedding methods, achieve very e cient trade-o s among the amount of embedded information (rate), the amount of embedding-induced distortion to the host signal, and the robustness to intentional and unintentional attacks. For example, we show that against independent additive Gaussian attacks, which ar...
متن کامل