Abstract
A number of newn on-linear watermark detectors have been proposed recently [1], [2], [3] in which the watermark detection statistic is an n th order polynomial function of the extracted vector. Coupled with a side-informed watermark embedding scheme that selects a watermark to maximise the detection output, it has been shown that hypothesis tests using such detectors are highly efficient. This paper presents further analysis of these non-linear schemes, focusing in particular on the robustness of the schemes in the presence of noise and the use of periodic filtering functions in order to reduce interference from the host signal.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
T. Furon, G. Silvestre, N. Hurley, “JANIS: Just Another N-Order Side-Informed Scheme” in Proceedings of ICIP 2002, Oct 2002. 106, 107, 109, 110
N. J. Hurley, G. C. M. Silvestre, “Nth Order AudioWatermarking” in Proceedings of SPIE 2022, Jan 2002. 106
N. J. Hurley, G. C. M. Silvestre and T. Furon, “Side-Informed Watermarking using Nth-Order Polynomial Detectors”, in Proceedings of EUSIPCO 2002, 2002. 106, 107, 110
I. Cox, J. Kilian, T. Leighton, and T. Shannon, “Secure spread sprectrum watermarking for multimedia,” IEEE Transactions on Image Processing 6(12), pp. 1673–1687, 1997. 106
F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing 66(3), pp. 283–301, May 1998. 106
J. Eggers, J. Su, and B. Girod, “A blind watermarking scheme based on structured codebooks,” in IEE Colloquium on Secure Images and Image Authentication, pp. 41–46, (Savoy Place London), April 10 2000. 106
T. Furon and P. Duhamel, “An asymmetric public detection watermarking technique,” in Workshop on information hiding, (Dresden, Genmany), Oct. 2000. 106
T. Furon, I. Venturini, and P. Duhamel, “Unified approach of asymmetric watermarking schemes,” in Security and Watermarking of Multimedia Contents III, Proc. SPIE 4313, 22-25 January 2001. 107
J. Eggers, J. Su, and B. Girod, “Asymmetric watermarking schemes,” in Tagungsband des GI Workshops Sicherheit in Mediendaten, Springer Reihe: Informatik Aktuell, (Berlin, Germany), Sept. 2000. 110
B. Chen and G. Wornell, “Dither modulation: a newap proach to digital watermarking and information embedding,” in Security and Watermarking of Multimedia Contents, Proc. SPIE 3657, January 1999. 110
M. Ramkumar and A.N. Akansu, “Self-noise suppression schemes for blind image steganography”, in SPIE Multimedia Systems and Applications (Image Security) 3845, Boston, MA, Sept. 1999. 110
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Silvestre, G.C., Hurley, N.J., Furon, T. (2003). Robustness and Efficiency of Non-linear Side-Informed Watermarking. In: Petitcolas, F.A.P. (eds) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36415-3_7
Download citation
DOI: https://doi.org/10.1007/3-540-36415-3_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00421-9
Online ISBN: 978-3-540-36415-3
eBook Packages: Springer Book Archive