Statistical analysis of watermarking schemes for copyright protection of images

被引:126
作者
Hernández, JR [1 ]
Pérez-González, F [1 ]
机构
[1] Univ Vigo, Dept Tecnol Commun, Vigo 36200, Spain
关键词
codes; copyright protection; cryptography; decision-making; image communication; image processing; information theory;
D O I
10.1109/5.771069
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we address the problem of the performance analysis of image watermarking systems that do not require the availability of the original image during ownership verification. We focus olt a statistical approach to obtain models that can serve as a basis for the application of the decision theory to the design of efficient detector structures. Special attention is paid to the possible nonexistence of a statistical description of the original image. Different modeling approaches are proposed for the cases when such a statistical characterization is known and,when it is not, Watermarks ks may encode a message, and the performance of the watermarking system is evaluated using as a measure the probability of false alarm, the probability of detection when the presence of the watermark is tested, and the probability of error when the information that it carries is extracted. Finally, the modeling techniques studied are applied to the analysis of two watermarking schemes, one of them defined in the spatial domain, and the other, in the direct cosine transform (DCT) domain. The theoretical results are contrasted with empirical data obtained through experimentation covering several cases of interest. We show how choosing an appropriate statistical model for the original image can lead to considerable improvements in performance.
引用
收藏
页码:1142 / 1166
页数:25
相关论文
共 71 条
[1]  
AHUMADA AJ, 1992, HUMAN VISION VISUAL, V3
[2]   IMAGE-RESTORATION BASED ON A SUBJECTIVE CRITERION [J].
ANDERSON, GL ;
NETRAVALI, AN .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1976, 6 (12) :845-853
[3]   A DCT-domain system for robust image watermarking [J].
Barni, M ;
Bartolini, F ;
Cappellini, V ;
Piva, A .
SIGNAL PROCESSING, 1998, 66 (03) :357-372
[4]  
Bayer D., 1993, Sequences Ii, P329
[5]  
BLEUMER G, 1998, P INF HID 2 INT WORK, P101
[6]  
BONEY L, 1996, EUSIPCO 96, P1697
[7]  
Brassil J., 1995, Proceedings of the Twenty-Ninth Annual Conference on Information Sciences and Systems, P482
[8]  
BRASSIL J, P INF 94, P1278
[9]   ELECTRONIC MARKING AND IDENTIFICATION TECHNIQUES TO DISCOURAGE DOCUMENT COPYING [J].
BRASSIL, JT ;
LOW, S ;
MAXEMCHUK, NF ;
OGORMAN, L .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1995, 13 (08) :1495-1504
[10]  
CHOUDHURY AK, 1995, IEEE NETWORK, V9, P12, DOI 10.1109/65.386048