Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Dither Modulation in the Logarithmic Domain

  • Conference paper
Digital Watermarking (IWDW 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5041))

Included in the following conference series:

  • 882 Accesses

Abstract

Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ruining the performance of the watermarking system with almost non perceptually altering the watermarked signal. In this paper we propose a new family of quantization-based methods, based on both Dither Modulation and Spread Transform Dither Modulation, oriented to deal with those attacks, and which presents another outstanding property: they produce perceptually shaped watermarks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  2. Abrardo, A., Barni, M.: Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding. IEEE Transactions on Signal Processing 53(2), 824–833 (2005)

    Article  MathSciNet  Google Scholar 

  3. Pérez-González, F., Mosquera, C., Barni, M., Abrardo, A.: Rational dither modulation: a high-rate data-hiding method robust to gain attacks. IEEE Transaction on Signal Processing 53(10), 3960–3975 (2005)

    Article  MathSciNet  Google Scholar 

  4. Lee, K., Kim, D.S., Moon, K.A.: Amplitude-modification resilient watermarking based on a-law companding. In: IEEE International Conference on Image Processing, September 2003, vol. 3, pp. 459–462 (2003)

    Google Scholar 

  5. Pérez-González, F., Balado, F., Hernández, J.R.: Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Transactions on Signal Processing 51(4), 960–980 (2003); Special Issue Signal Processing for Data Hiding in Digital Media & Secure Content Delivery

    Article  MathSciNet  Google Scholar 

  6. Bartolini, F., Barni, M., Piva, A.: Performance analysis of ST-DM watermarking in presence of nonadditive attacks. IEEE Transactions on Signal Processing 52(10), 2965–2974 (2004)

    Article  Google Scholar 

  7. Watson, A.B.: DCT quantization matrices visually optimized for individual images. In: Proceedings of SPIE, vol. 1913(14), pp. 202–216 (1993); Human Vision, Visual Processing and Digital Display IV

    Google Scholar 

  8. Barni, M., Bartolini, F.: Watermarking Systems Engineering. Marcel Dekker, New York (2004)

    Google Scholar 

  9. Lemma, A., van der Veen, M., Celik, M.: A new modulation based watermarking technique for video. In: Proceedings of SPIE, vol. 6072 (2006); Security, Steganography, and Watermarking of Multimedia Contents VIII

    Google Scholar 

  10. Comesaña, P., Pérez-González, F., Balado, F.: On distortion-compesated dither modulation data-hiding with repetition coding. IEEE Transactions on Signal Processing 54(2), 585–600 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Comesaña, P., Pérez-González, F. (2008). Dither Modulation in the Logarithmic Domain. In: Shi, Y.Q., Kim, HJ., Katzenbeisser, S. (eds) Digital Watermarking. IWDW 2007. Lecture Notes in Computer Science, vol 5041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92238-4_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-92238-4_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-92237-7

  • Online ISBN: 978-3-540-92238-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics