Perfomance analysis of the Fridrich-Goljan self-embedding authentication method

A performance analysis of the authentication method proposed by J. Fridrich and M. Goljan is carried out. This method has the particular feature that both the embedder and the detector generate the watermark from a perceptual digest of the image. Hence, in order to accurately analyze the performance, the digest errors caused by the watermark embedding, the addition of a complementary signal and the scaling attacks are also taken into account.

[1]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[2]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[3]  H. V. Trees Detection, Estimation, And Modulation Theory , 2001 .

[4]  Fernando Pérez-González,et al.  Performance Analysis of Fridrich–Goljan Self-Embedding Authentication Method , 2009, IEEE Transactions on Information Forensics and Security.

[5]  K A Birney,et al.  On the modeling of DCT and subband image data for compression , 1995, IEEE Trans. Image Process..

[6]  Harry L. Van Trees,et al.  Detection, Estimation, and Modulation Theory, Part I , 1968 .