Preprocessed and postprocessed quantization index modulation methods for digital watermarking
نویسندگان
چکیده
Quantization index modulation (QIM) methods, a class of digital watermarking and information embedding methods, achieve very e cient trade-o s among the amount of embedded information (rate), the amount of embedding-induced distortion to the host signal, and the robustness to intentional and unintentional attacks. For example, we show that against independent additive Gaussian attacks, which are good models for at least some types of uninformed and unintentional attacks, QIM methods exist that achieve the best possible rate-distortion-robustness trade-o s (i.e., capacity) asymptotically at high rates and achieve performance within a few dB of capacity at all nite rates. Furthermore, low-complexity realizations of QIM methods, such as so-called dither modulation, have also been shown to achieve favorable rate-distortion-robustness trade-o s. We further develop preprocessing and postprocessing techniques that enable QIM to fully achieve capacity, not only against Gaussian attacks but also against other types of attacks as well. One practical postprocessing technique we develop we refer to as distortion compensation. Distortion compensation has the property that when suitably optimized it is su cient for use in conjunction with QIM to achieve capacity against Gaussian attacks and against square-error distortion-constrained attacks. More generally, we present the results of a comparative information theoretic analysis of the fundamental performance limits of QIM, distortion-compensated QIM, and other watermarking methods and demonstrate practically achievable gains with experimental results.
منابع مشابه
Energy Quantization Modulation Approach for Image Watermarking
For copyright protection of digital image, we present an energy quantization modulation approach for digital image watermarking in this paper. First, we introduce the concept of local energy index of a coefficient block in approximation sub-band of an image. Second, an energy quantization modulation technique is developed to modulate the local energy index of each coefficient block. Moreover, i...
متن کاملA Robust Digital Image Watermarking Scheme Based on DWT
In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...
متن کاملQuantization index modulation: A class of provably good methods for digital watermarking and information embedding
We consider the problem of embedding one signal (e.g., a digital watermark), within another “host” signal to form a third, “composite” signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing information-embedding rate, minimizing distortion between the host signal and composite signal, and maximizing the robustness of the embedding. We in...
متن کاملA Robust Digital Image Watermarking Scheme Based on DWT
In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...
متن کاملRobust Reversible Watermarking Based On Normalized Correlation Quantization Index Modulation Combined With Cdma Techniques
A novel quantization watermarking scheme is presented in this paper, which is established following the feature modulation watermarking model. In this scheme, a feature signal is achieved by computing the normalized correlation (NC) between the host signal and a random signal. Information modulation is carried out on the generated NC by selecting a codeword from the codebook related with the em...
متن کامل