Performance evaluation of multiple watermarks system

被引:12
作者
Zhang, Fan [1 ]
Zhang, Xinhong [2 ]
机构
[1] Tianjin Univ, Coll Elect & Informat Engn, Tianjin 300072, Peoples R China
[2] Henan Med Univ, Dept Comp Ctr, Henan 475001, Peoples R China
来源
SECOND WORKSHOP ON DIGITAL MEDIA AND ITS APPLICATION IN MUSEUM & HERITAGE, PROCEEDINGS | 2007年
关键词
D O I
10.1109/DMAMH.2007.84
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A multiple watermarking algorithm based on the Code Division Multiple Access (CDMA) technique is presented. According to the multiple accessing technique of the CDMA system, multiple copyright identifiers are embedded into digital images. Performance evaluation of this multiple watermarks system are presented. This paper proposed a analysis of multiple watermarks system capacity. When two watermarks are embedded in an image at the same time, the capacity is larger than the capacity when the single watermark is embedded, and is smaller than the sum of the capacity of two watermarks are embedded respectively. Bit error rate (BER) performance of multiple watermarks system is also evaluated.
引用
收藏
页码:15 / +
页数:2
相关论文
共 16 条
  • [1] ANDERSON RJ, 1996, LECT NOTES COMPUTERS, V1174
  • [2] Capacity of the watermark-channel: How many bits can be hidden within a digital image?
    Barni, M
    Bartolini, F
    De Rosa, A
    Piva, A
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 : 437 - 448
  • [3] WRITING ON DIRTY PAPER
    COSTA, MHM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (03) : 439 - 441
  • [4] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [5] The first 50 years of electronic watermarking
    Cox, IJ
    Miller, ML
    [J]. EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2002, 2002 (02) : 126 - 132
  • [6] Hidden digital watermarks in images
    Hsu, CT
    Wu, JL
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) : 58 - 68
  • [7] LIN CY, 2001, IEEE INT C IM PROC, V3, P1007
  • [8] Multipurpose watermarking for image authentication and protection
    Lu, CS
    Liao, HYM
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (10) : 1579 - 1592
  • [9] A framework for evaluating the data-hiding capacity of image sources
    Moulin, P
    Mihçak, MK
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (09) : 1029 - 1042
  • [10] Information theoretic analysis of steganography
    O'Sullivan, JA
    Moulin, P
    Ettinger, JM
    [J]. 1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 297 - 297