Performance Analysis of Scalar DC-QIM Forwatermark Detection

Quantization-based schemes, such as scalar DC-QIM, have demonstrated performance merits for data-hiding problem, which is mainly a transmission problem. However, a number of applications are stated in terms of watermark detection problem (also named one-bit watermarking), and this situation has been seldom addressed in the literature for quantization-based techniques. In this context, we carry out a complete performance analysis of uniform quantizers-based schemes with distortion compensation (DC) under additive white Gaussian noise. Implementing an exact Neyman-Pearson test and using large deviation theory, performances are evaluated according to receiver operating characteristic (ROC) and probability of error. Optimal DC's regarding to ROC performances are derived. It is pointed out that false-alarm and miss detection capabilities are jointly optimized by the same DC value. Then, performances are compared with raw quantized-schemes (i.e. without DC) and spread-spectrum (SS) watermarking. It is shown that DC-QIM always outperforms QIM and SS for detection task. The gain provided by the DC reaches several orders of magnitude for cases of interest, that is for low watermark-to-noise regimes. A short comparison is also provided with respect to the corresponding transmission problem, thus evaluating the loss in performance due to the detection

[1]  David L. Neuhoff,et al.  Quantization , 2022, IEEE Trans. Inf. Theory.

[2]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[3]  Neri Merhav,et al.  Identification in the presence of side information with application to watermarking , 2001, IEEE Trans. Inf. Theory.

[4]  Pedro Comesaña Alfaro,et al.  Detection in quantization-based watermarking: performance and security issues , 2005, IS&T/SPIE Electronic Imaging.

[5]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[6]  Bernd Girod,et al.  Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[7]  Pierre Moulin,et al.  Error exponents for one-bit watermarking , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[8]  Juan R. Hern,et al.  Statistical Analysis of Watermarking Schemes for Copyright Protection of Images , 1999 .

[9]  Jacques Blanc-Talon,et al.  Game-theoretic analysis of a semi-fragile watermarking scheme based on SCS , 2005, IEEE International Conference on Image Processing 2005.

[10]  Michel Mandjes,et al.  Large Deviations for Performance Analysis: Queues, Communications, and Computing , Adam Shwartz and Alan Weiss (New York: Chapman and Hall, 1995). , 1996, Probability in the Engineering and Informational Sciences.

[11]  H. V. Trees Detection, Estimation, And Modulation Theory , 2001 .

[12]  Thomas L. Marzetta,et al.  Detection, Estimation, and Modulation Theory , 1976 .