DCT-domain watermarking techniques for still images:: Detector performance analysis and a new structure

被引:476
作者
Hernández, JR [1 ]
Amado, M [1 ]
Pérez-González, F [1 ]
机构
[1] Univ Vigo, ETSI Telecomunicac, Dept Tecnol Comunicac, Vigo 36200, Pontevedra, Spain
关键词
copyright protection; discrete cosine transform; signal detection; spread spectrum communication;
D O I
10.1109/83.817598
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a spread-spectrum-like discrete cosine transform domain (DCT domain) watermarking technique for copyright protection of still digital images is analyzed. The DCT is applied in blocks of 8 x 8 pixels as in the JPEG algorithm. The watermark can encode information to track illegal misuses, For flexibility purposes, the original image is not necessary during the ownership verification process, so it must be modeled by noise. Two tests are involved in the ownership verification stage: watermark decoding, in which the message carried by the watermark is extracted, and watermark detection, which decides whether a given image contains a watermark generated with a certain key. We apply generalized Gaussian distributions to statistically model the DCT coefficients of the original image and show how the resulting detector structures lead to considerable improvements in performance with respect to the correlation receiver, which has been widely considered in the literature and makes use of the Gaussian noise assumption. As a result of our work, analytical expressions for performance measures such as the probability of error in watermark decoding and probabilities of false alarm and detection in watermark detection are derived and contrasted with experimental results.
引用
收藏
页码:55 / 68
页数:14
相关论文
共 30 条
  • [1] Ahumada A. J. Jr., 1992, Proceedings of the SPIE - The International Society for Optical Engineering, V1666, P365, DOI 10.1117/12.135982
  • [2] [Anonymous], COMPUTER SCI TECHNIC
  • [3] A DCT-domain system for robust image watermarking
    Barni, M
    Bartolini, F
    Cappellini, V
    Piva, A
    [J]. SIGNAL PROCESSING, 1998, 66 (03) : 357 - 372
  • [4] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [5] ON THE MODELING OF DCT AND SUBBAND IMAGE DATA FOR COMPRESSION
    BIRNEY, KA
    FISCHER, TR
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1995, 4 (02) : 186 - 193
  • [6] Bors AG, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P231, DOI 10.1109/ICIP.1996.560426
  • [7] Clarke R. J., 1985, TRANSFORM CODING IMA
  • [8] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [9] GRUHL D, 1998, P INF HID WORKSH POR
  • [10] Statistical analysis of watermarking schemes for copyright protection of images
    Hernández, JR
    Pérez-González, F
    [J]. PROCEEDINGS OF THE IEEE, 1999, 87 (07) : 1142 - 1166