Skip to main content

Robustness and Efficiency of Non-linear Side-Informed Watermarking

  • Conference paper
  • First Online:
Information Hiding (IH 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2578))

Included in the following conference series:

  • 1048 Accesses

Abstract

A number of newn on-linear watermark detectors have been proposed recently [1], [2], [3] in which the watermark detection statistic is an n th order polynomial function of the extracted vector. Coupled with a side-informed watermark embedding scheme that selects a watermark to maximise the detection output, it has been shown that hypothesis tests using such detectors are highly efficient. This paper presents further analysis of these non-linear schemes, focusing in particular on the robustness of the schemes in the presence of noise and the use of periodic filtering functions in order to reduce interference from the host signal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. T. Furon, G. Silvestre, N. Hurley, “JANIS: Just Another N-Order Side-Informed Scheme” in Proceedings of ICIP 2002, Oct 2002. 106, 107, 109, 110

    Google Scholar 

  2. N. J. Hurley, G. C. M. Silvestre, “Nth Order AudioWatermarking” in Proceedings of SPIE 2022, Jan 2002. 106

    Google Scholar 

  3. N. J. Hurley, G. C. M. Silvestre and T. Furon, “Side-Informed Watermarking using Nth-Order Polynomial Detectors”, in Proceedings of EUSIPCO 2002, 2002. 106, 107, 110

    Google Scholar 

  4. I. Cox, J. Kilian, T. Leighton, and T. Shannon, “Secure spread sprectrum watermarking for multimedia,” IEEE Transactions on Image Processing 6(12), pp. 1673–1687, 1997. 106

    Article  Google Scholar 

  5. F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing 66(3), pp. 283–301, May 1998. 106

    Article  MATH  Google Scholar 

  6. J. Eggers, J. Su, and B. Girod, “A blind watermarking scheme based on structured codebooks,” in IEE Colloquium on Secure Images and Image Authentication, pp. 41–46, (Savoy Place London), April 10 2000. 106

    Google Scholar 

  7. T. Furon and P. Duhamel, “An asymmetric public detection watermarking technique,” in Workshop on information hiding, (Dresden, Genmany), Oct. 2000. 106

    Google Scholar 

  8. T. Furon, I. Venturini, and P. Duhamel, “Unified approach of asymmetric watermarking schemes,” in Security and Watermarking of Multimedia Contents III, Proc. SPIE 4313, 22-25 January 2001. 107

    Google Scholar 

  9. J. Eggers, J. Su, and B. Girod, “Asymmetric watermarking schemes,” in Tagungsband des GI Workshops Sicherheit in Mediendaten, Springer Reihe: Informatik Aktuell, (Berlin, Germany), Sept. 2000. 110

    Google Scholar 

  10. B. Chen and G. Wornell, “Dither modulation: a newap proach to digital watermarking and information embedding,” in Security and Watermarking of Multimedia Contents, Proc. SPIE 3657, January 1999. 110

    Google Scholar 

  11. M. Ramkumar and A.N. Akansu, “Self-noise suppression schemes for blind image steganography”, in SPIE Multimedia Systems and Applications (Image Security) 3845, Boston, MA, Sept. 1999. 110

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Silvestre, G.C., Hurley, N.J., Furon, T. (2003). Robustness and Efficiency of Non-linear Side-Informed Watermarking. In: Petitcolas, F.A.P. (eds) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36415-3_7

Download citation

  • DOI: https://doi.org/10.1007/3-540-36415-3_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00421-9

  • Online ISBN: 978-3-540-36415-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics