Performance analysis of ST-DM watermarking in presence of nonadditive attacks

被引:22
作者
Bartolini, F
Barni, M
Piva, A
机构
[1] Univ Florence, Dept Elect & Telecommun, I-50139 Florence, Italy
[2] Univ Siena, Dept Informat Engn, I-53100 Siena, Italy
[3] Univ Florence, Natl Interuniv Consortium Telecommun, I-50139 Florence, Italy
关键词
gain attack; nonadditive watermarking channel; quantization attack; ST-DM watermarking;
D O I
10.1109/TSP.2004.833868
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The performance of spread-transform dither modulation (ST-DM) watermarking in the presence of two important classes of non additive attacks, such as the gain attack plus noise addition, and the quantization attack are evaluated. The analysis is developed under the assumption that the host features are independent and identically distributed Gaussian random variables, and that a minimum distance criterion is used to decode the hidden information. The theoretical bit-error probabilities are derived in closed form, thus permitting to evaluate the impact of the considered attacks on the watermark at a theoretical level. The analysis is validated by means of extensive Monte Carlo simulations. In addition to the validation of the theoretical analysis, Monte Carlo simulations permitted to abandon the hypothesis of normally distributed host features, in favor of more realistic models adopting a Laplacian or a generalized Gaussian probability density function. The general result of our analysis is that the excellent performance of ST-DM are confirmed in all cases with the only noticeable exception of the gain attack.
引用
收藏
页码:2965 / 2974
页数:10
相关论文
共 11 条
[1]  
Chen B, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 1, P13, DOI 10.1109/MMCS.1999.779113
[2]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[3]  
Chou J, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P133
[4]  
Chou J, 2000, IEEE IMAGE PROC, P585, DOI 10.1109/ICIP.2000.901026
[5]   The Gaussian watermarking game [J].
Cohen, AS ;
Lapidoth, A .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2002, 48 (06) :1639-1667
[6]   WRITING ON DIRTY PAPER [J].
COSTA, MHM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (03) :439-441
[7]   Watermarking as communications with side information [J].
Cox, IJ ;
Miller, ML ;
McKellips, AL .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1127-1141
[8]  
Gel'fand S. I., 1980, Problems of Control and Information Theory, V9, P19
[9]   Applying informed coding and embedding to design a robust high-capacity watermark [J].
Miller, ML ;
Doërr, GJ ;
Cox, IJ .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (06) :792-807
[10]   The role of information theory in watermarking and its application to image watermarking [J].
Moulin, P .
SIGNAL PROCESSING, 2001, 81 (06) :1121-1139