Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images

A watermarking scheme for copyright protection of still images is modeled and analyzed. In this scheme a signal following a key-dependent two-dimensional multipulse modulation is added to the image for ownership enforcement purposes. The main contribution of this paper is the introduction of an analytical point of view to the estimation of performance measurements. Two topics are covered in the analysis: the ownership verification process, also called watermark detection test, and the data hiding process. In the first case, bounds and approximations to the receiver operating characteristic are derived. These results can be used to determine the threshold associated to a required probability of false alarm and the corresponding probability of detection. The data hiding process is modeled as a communications system and approximations for the bit error rate are derived. Finally, analytical expressions are contrasted with experimental results.

[1]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[2]  B.W. Dickinson,et al.  An introduction to statistical signal processing with applications , 1979, Proceedings of the IEEE.

[3]  Arun N. Netravali,et al.  Digital Pictures: Representation, Compression and Standards , 1995 .

[4]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[5]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[6]  B. Zhu,et al.  Transparent robust authentication and distortion measurement technique for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[7]  Frank Boland,et al.  Watermarking digital images for copyright protection , 1995 .

[8]  Naohisa Ohta,et al.  Digital compression technologies and systems for video communications : 7-9 October 1996, Berlin, FRG , 1996 .

[9]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[10]  Jorge Herbert de Lira,et al.  Two-Dimensional Signal and Image Processing , 1989 .

[11]  Eckhard Koch,et al.  Copyright Protection for Multimedia Data , 1994 .

[12]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[13]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[14]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[15]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[16]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[17]  R. Viswanathan,et al.  An introduction to statistical signal processing with applications , 1979 .

[18]  Bruno O. Shubert,et al.  Random variables and stochastic processes , 1979 .

[19]  Bin Zhu,et al.  Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.