Capacity of the watermark-channel: How many bits can be hidden within a digital image?

被引:55
作者
Barni, M [1 ]
Bartolini, F [1 ]
De Rosa, A [1 ]
Piva, A [1 ]
机构
[1] Univ Siena, Dept Informat Engn, I-53100 Siena, Italy
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS | 1999年 / 3657卷
关键词
digital watermarking; image watermarking; frequency-domain watermarking; watermark capacity; copyright protection; DCT DFT coefficient modeling;
D O I
10.1117/12.344694
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An evaluation of the number of bits that can be hidden within an image by means of frequency-domain watermarking is given. Watermarking is assumed to consist in the modification of a set of full-frame DCT (DFT) coefficients. The amount of modification each coefficient undergoes is proportional to the magnitude of the coefficient itself, so that an additive-multiplicative embedding rule results. The watermark-channel is modeled by letting the watermark be the signal and the image coefficients the noise introduced by the channel. To derive the capacity of each coefficient, the input (i.e. the watermark) and the output (i.e. the watermarked coefficients) of the channel are quantized, thus leading to a discrete-input, discrete-output model. Capacity is evaluated by computing the channel transition matrix and by maximizing the mutual input/output information. Though the results we obtained do not take into account attacks, they represent a useful indication about the amount of information that can be hidden within a single image.
引用
收藏
页码:437 / 448
页数:4
相关论文
共 16 条
[1]   A DCT-domain system for robust image watermarking [J].
Barni, M ;
Bartolini, F ;
Cappellini, V ;
Piva, A .
SIGNAL PROCESSING, 1998, 66 (03) :357-372
[2]  
BARNI M, 1998, P 9 EUR SIGN PROC C, P1513
[3]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[4]   Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, MM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :573-586
[5]  
GALLAGER RG, 1968, INFORMATION THEORY R
[6]   COMPARISON OF GENERALIZED GAUSSIAN AND LAPLACIAN MODELING IN DCT IMAGE-CODING [J].
JOSHI, RL ;
FISCHER, TR .
IEEE SIGNAL PROCESSING LETTERS, 1995, 2 (05) :81-82
[7]  
KALKER T, 1998, P 9 EUR SIGN PROC C, P13
[8]   DISTRIBUTION SHAPE OF 2-DIMENSIONAL DCT COEFFICIENTS OF NATURAL IMAGES [J].
MULLER, F .
ELECTRONICS LETTERS, 1993, 29 (22) :1935-1936
[9]  
ORuanaidh JJK, 1997, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL I, P536, DOI 10.1109/ICIP.1997.647968
[10]   Copyright protection of digital images by means of frequency domain watermarking [J].
Piva, A ;
Barni, M ;
Bartolini, F .
MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION, 1998, 3456 :25-35