Computing the Probability of False Watermark Detection

Several methods of watermark detection involve computing a vector from some input media, computing the normalized correlation between that vector and a predefined watermark vector, and comparing the result against a threshold. We show that, if the probability density function of vectors that arise from random, unwatermarked media is a zero-mean, spherical Gaussian, then the probability that such a detector will give a false detection is given exactly by a simple ratio of two definite integrals. This expression depends only on the detection threshold and the dimensionality of the watermark vector.

[1]  J. H. Ahrens,et al.  Extensions of Forsythe’s method for random sampling from the normal distribution , 1973 .

[2]  Ingemar J. Cox,et al.  Watermarking as communications with side information : Identification and protection of multimedia information , 1999 .

[3]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[4]  Jean-Paul M. G. Linnartz,et al.  Improved watermark detection reliability using filtering before correlation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[5]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[6]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[7]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[8]  Robert V. Hogg,et al.  Introduction to Mathematical Statistics. , 1966 .

[9]  Fernando Pérez-González,et al.  Shedding More Light on Image Watermarks , 1998, Information Hiding.

[10]  Ton Kalker,et al.  Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.

[11]  DAVID G. KENDALL,et al.  Introduction to Mathematical Statistics , 1947, Nature.

[12]  Jean-Paul M. G. Linnartz,et al.  Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.

[13]  Ingemar J. Cox,et al.  A Review of of Watermarking Principles and Practices , 1999 .

[14]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[15]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[16]  Warren D. Smith Studies in computational geometry motivated by mesh generation , 1989 .