Hardware implementation perspectives of digital video watermarking algorithms

We consider hardware implementation aspects of the digital watermarking problem through the implementation of a well-known video watermarking algorithm called just another watermarking system (JAWS); we discuss the time and area constraints that must be satisfied by a successful hardware implementation. A hardware architecture that implements the algorithm under the constraints is then proposed. The architecture is analyzed to gain an understanding of the relationships between algorithmic features and implementation cost. Some general findings of this work that can be applied toward making algorithmic developments more amenable to hardware implementation are finally presented.

[1]  Mauro Barni,et al.  Mask building for perceptually hiding frequency embedded watermarks , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[2]  Mahalingam Ramkumar,et al.  Theoretical capacity measures for data hiding in compressed images , 1999, Other Conferences.

[3]  Peter Wayner Disappearing cryptography - being and nothingness on the net , 1996 .

[4]  J. Vandewege,et al.  Implementation of a real-time digital watermarking process for broadcast monitoring on a TriMedia VLIW processor , 2000 .

[5]  Jean-Paul M. G. Linnartz,et al.  System aspects of copy management for digital video , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[6]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[7]  Ton Kalker,et al.  Exploiting shift invariance to obtain a high payload in digital image watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[8]  Thierry Pun,et al.  Optimal adaptive diversity watermarking with channel state estimation , 2001, IS&T/SPIE Electronic Imaging.

[9]  Deepa Kundur,et al.  Transform-based hybrid data hiding for improved robustness in the presence of perceptual coding , 2001, SPIE Optics + Photonics.

[10]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[11]  Edward J. Delp,et al.  The effect of matching watermark and compression transforms in compressed color images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[12]  Jean-Paul M. G. Linnartz,et al.  Improved watermark detection reliability using filtering before correlation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[13]  Christophe De Vleeschouwer,et al.  Low Cost Watermarking Based on a Human Vision Model , 1997, ECMAST.

[14]  Deepa Kundur,et al.  Diversity and attack characterization for improved robust watermarking , 2001, IEEE Trans. Signal Process..

[15]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .

[16]  Ton Kalker,et al.  Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.

[17]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[18]  Bülent Sankur,et al.  1 2 3 4 5 6 7 8 , 2000 .

[19]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[20]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[21]  Gonzalo R. Arce,et al.  Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).