Geometric Properties of Watermarking Schemes

نویسندگان

  • Ee-Chien Chang
  • Michael T. Orchard
چکیده

A variety of image watermarking schemes have been proposed using orthogonal transformations, projections, and coding techniques to embed imperceptible watermarks into images. Analytical studies of the watermarking problem have typically been based on studying the performance limits of these known algorithms. In contrast, this paper formalizes the watermarking problem in an “algorithm independent” framework, representing any watermarking algorithm as a partition of the image space into a collection of sets, and defining requirements of these sets that must be met by any solution to the watermarking problem. Specifically, these requirements define and constrain the falsealarm ratio, distortion, robustness and security of a watermarking system. Using this formalism, we first characterize common features of algorithms that solve the watermarking problem. We show how the requirements defined earlier force important differences between watermarking signal sets and classical communication systems signal sets. Next, we show how common components of existing watermarking algorithms (e.g. transformations, projections, and coding) can be associated with specific requirements of the watermarking definition. Finally, we show how our new formalism of the watermarking problem provides a procedure for optimal design of watermarking systems to target specified false-alarm, distortion, and robustness objectives.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Analysis of Normalization based Image Watermarking Techniques

This paper presents a comparative study of watermarking schemes. The embedding of watermark is performed after the image normalization. By normalization process the normalized image achieves invariance properties against geometric attacks which include rotation, scaling and translation of an image. Watermarking is done using five methods DCT Zigzag, DCT blocks, DWT, Zernike transform, SVD-DCT. ...

متن کامل

On the Intractability of Inverting Geometric Distortions in Watermarking Schemes

We examine the problem of watermarking schemes robust against geometric distortions from a complexity theoretic point of view. The main results presented are polynomial time reductions showing that the inversion of geometric distortions is computationally intractable.

متن کامل

Improved autocorrelation function based watermarking with side information

We propose an improved autocorrelation function (ACF)based image watermarking that is robust to combined geometric and removal attacks. ACF-based watermarking is thought of as one of the most effective watermarking schemes that resist geometric attacks. In this watermarking scheme, the autocorrelation peaks of the watermark play an important role for geometric attack estimation. The peaks, howe...

متن کامل

Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...

متن کامل

Two Novel Chaos-Based Algorithms for Image and Video Watermarking

In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000