• Article
  • | |
  • Metrics
  • |
  • Reference [14]
  • |
  • Related [20]
  • |
  • Cited by [4]
  • | |
  • Comments
    Abstract:

    Traditional blind additive SS (spread spectrum) watermarking systems have such features: high robustness, low detection value and small capacity. The main reason leading to low detection value is the host signal’s interference. Based on the Gaussian signal detection principle under Gaussian noise, the correlation detection is analyzed in theory. In addition, the using condition of correlation detector and the relationship between the normalized correlation detector and SNR (signal noise ratio) are discussed in this paper. Based on these analyses, an improved blind additive watermarking algorithm is designed. Experimental results show that the algorithm effectively holds back the interference of host signal and the performance of detection has been greatly improved. Furthermore, it has greater robustness and imperceptibility.

    Reference
    [1]Cox IJ, Kilian J, Leighton T, Shamoon T. A secure, robust watermark for multimedia. In: Proc. of the Inform. Hiding Workshop.Cambridge, 1996. 147-158.
    [2]Cox I J, Kilian J, Leighton T, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing,1997,6(12):1673-1687.
    [3]Chen B, Wornell GW. Digital watermarking and information embedding using dither modulation. In: Proc. of the 1998 IEEE 2nd Workshop on Multimedia Signal Processing. Redondo Beach, 1998. 273-278.
    [4]Chen B, Wornell GW. Achievable performance of digital watermarking systems. In: Proc. of the IEEE Int'l Conf. on Multimedia Computing and Systems 1999, Special Session on Security and Watermarking, Vol 1. Florence, 1999. 13-18.
    [5]Chen B, Wornell GW. Provably robust digital watermarking. In: Proc. of the SPIE: Multimedia Systems and Applications Ⅱ,Vol.3845. Boston, 1999. 43-54.
    [6]Eggers JJ, Su JK, Girod B. A blind watermarking scheme based on structured codebooks. In: IEEE Colloquium: Secure Images and Image Authentication. London, 2000.
    [7]Eggers JJ, Su JK. Performance of a practical blind watermarking scheme. In: Proc. of the SPIE: Electronic Imaging 2001, Security and Watermarking of Multimedia Contents Ⅲ, Vol 4314. San Jose, 2001.
    [8]Eggers JJ, Girod B. Quantization effects on digital watermarks. Signal Processing, 2001,81(2):239-263.
    [9]Cox IJ, Miller ML, McKellips AL. Watermarking as communications with side information. Proc. of the IEEE, 1999,87(7):1127-1141.
    [10]Eggers JJ, B(a)uml R, Tzschoppe R, Girod B. Scalar costa scheme for information embedding. IEEE Trans. on Signal Processing,2003,51(4):1003-1019.
    [11]Ju DH, Lin KX, Chen J. Guide to Signal Detection Theory. Beijing: Science Press, 1977 (in Chinese).
    [12]Cox IJ, Miller ML, Bloom JA. Digital Watermarking. Beijing: Publishing House of Electronics Industry; Morgan Kaufmann Publishers, 2003 (in Chinese).
    [11]鞠德航,林可祥,陈捷.信号检测理论导论.北京:科学出版社,1977.
    [12]Cox IJ,Miller ML,Bloom JA.数字水印.北京:电子工业出版社;Morgan Kaufmann Publishers,2003.
    Comments
    Comments
    分享到微博
    Submit
Get Citation

燕晓,蒙应杰,王阳,郁军.一种强干扰背景下的盲加性水印算法.软件学报,2005,16(9):1678-1684

Copy
Share
Article Metrics
  • Abstract:4326
  • PDF: 5381
  • HTML: 0
  • Cited by: 0
History
  • Received:January 14,2004
  • Revised:September 07,2004
You are the first2038676Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063