A soft decoding algorithm for watermarks subject to a jitter attack

被引:1
作者
Baudry, S [1 ]
Nguyen, P [1 ]
Maître, H [1 ]
机构
[1] THALES Commun, F-92231 Gennevilliers, France
来源
APPLICATIONS OF DIGITAL IMAGE PROCESSING XXIV | 2001年 / 4472卷
关键词
digital watermarking; jitter attack; geometric channel; Markov chain;
D O I
10.1117/12.449750
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Watermarking can be modeled as a transmission through a steganographic channel. Most of the channels studied up to now in the literature were additive or substitutive channels where the noise modifies the data value. But other modifications may occur, as geometric distortions: images may be cropped, scaled, non-linearly distorted etc. We model such transformations by a geometric channel, where the noise modifies the geometry of the image rather than the data values. We study the jitter channel which copies and deletes randomly some lines of the image. We use a Markov chain to model the channel, and propose an algorithm to enhance the detection of a watermark embedded by a spread-spectrum technique subject to a jitter attack.
引用
收藏
页码:144 / 154
页数:3
相关论文
共 13 条
[1]   OPTIMAL DECODING OF LINEAR CODES FOR MINIMIZING SYMBOL ERROR RATE [J].
BAHL, LR ;
COCKE, J ;
JELINEK, F ;
RAVIV, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1974, 20 (02) :284-287
[2]  
BAUDRY S, 2000, P ICIP 2000 VANC CAN, V3, P25
[3]   A MAXIMIZATION TECHNIQUE OCCURRING IN STATISTICAL ANALYSIS OF PROBABILISTIC FUNCTIONS OF MARKOV CHAINS [J].
BAUM, LE ;
PETRIE, T ;
SOULES, G ;
WEISS, N .
ANNALS OF MATHEMATICAL STATISTICS, 1970, 41 (01) :164-&
[4]   Reliable communication over channels with insertions, deletions, and substitutions [J].
Davey, MC ;
MacKay, DJC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (02) :687-698
[5]   Watermarking algorithm based on a human visual model [J].
Delaigle, JF ;
De Vleeschouwer, C ;
Macq, B .
SIGNAL PROCESSING, 1998, 66 (03) :319-335
[6]  
HERNANDEZ JR, 1998, P IEEE INT C AC SPEE, V5, P2973
[7]   A video watermarking system for broadcast monitoring [J].
Kalker, T ;
Depovere, G ;
Haitsma, J ;
Maes, M .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :103-112
[8]  
Levenshtein V.I., 1966, SOV PHYS DOKL, V10, DOI DOI 10.1109/TVCG.2012.323
[9]  
ORuanaidh JJK, 1997, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL I, P536, DOI 10.1109/ICIP.1997.647968
[10]   Effective channel coding for DCT watermarks [J].
Pereira, S ;
Voloshynovskiy, S ;
Pun, T .
2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2000, :671-673