期刊文献+

水印系统新容量理论研究 被引量:1

Novel Capacity Theory Research of Watermarking System
下载PDF
导出
摘要 回顾了水印容量研究的现状,认为水印容量是作为通信模型的最大可靠传输率,研究了给定载体这种固定信道的水印容量,对无攻击和有攻击2种情况作了深入的分析,在欧几里得距离的嵌入和攻击约束条件下,通过对载体在n维几何空间的变化分布情况,得到空间节点集合的量化分割与水印容量的关系,从而得到可计算的该载体的容量门限。最后分析了有攻击情况下水印提取错误率与水印容量的关系。 The status in quo of capacity theory research of watermarking system is simply reviewed. It is thought as maximum reliable transfer rate of communication model that watermark capacity is researched in fixed channel while cartier is presented. Two scenarios are deeply analyzed with attack behavior or not. Under conditions with embedding and attacking restriction in Euclidean measurement, the relationship between quantity division of n-dimensions nodes and watermark capacity is obtained. The capacity upon threshold can be calculating. At last, the relationship is analyzed between watermark extraction error rate and watermark capacity in attacking scenario.
出处 《北京大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第6期796-801,共6页 Acta Scientiarum Naturalium Universitatis Pekinensis
基金 博士后科学基金资助项目(20060390018)
关键词 数字水印 容量理论 N维空间 最优编码 digital watermark capacity theory n-dimensions space optimum coding
  • 相关文献

参考文献18

  • 1BARNI M,BARTOLINI F,DE ROSA A,et al.Capacity of full frame DCT image watermarks[J].IEEE Transactions on Image Processing,2000,9(8):1450-1455.
  • 2MOULIN P,O'SULLIVAN J A.Information-theoretic analysis of watermarking[C]//ICASSP 00.2000 IEEE International Conference on Acoustics,Speech,and Signal Processing,2000,6:3630-3633.
  • 3COHEN A S,LAPIDOTH A.The Gaussian watermarking game[J].IEEE Transactions on Information Theory,2002,48(6):1639-1667.
  • 4SOMEKH-BARUCH A,MERHAV N.On the capacity game of public watermarking systems[C]//IEEE International Symposium on Information Theory,Lausanne,2002:223.
  • 5COHEN A,LAPIDOTH A.Generalized writing on dirty paper[C]//IEEE International Symposium on Information Theory,Lausanne,2002:227.
  • 6MOULIN P,MIHCAK M K.A framework for evaluating the data-hiding capacity of image sources[J].IEEE Transactions on Image Processing,2002,11(9):1029-1042.
  • 7MOULIN P,JOSEPH A.O'Sullivan.Information-Theoretic Analysis of Information Hiding[J].IEEE Transactions on information theory,2003,49(3):563-593.
  • 8WONG P H W,AU O C.A capacity estimation technique for JPEG-to-JPEG image watermarking[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):746-752.
  • 9WONG P H W,YEUNG G Y M,AU O C.Capacity for jpeg2000-to-jpeg2000 images watermarking[C]//ICME '03.Proceedings.2003 International Conference on Multimedia and Expo,2003,2:485-488.
  • 10SU J K,EGGERS J J,GIROD B.Analysis of digital watermarks subjected to optimum linear filtering and additive noise[C]//IEEE Trans Signal Proc:Special Issue on Information Theoretic Issues in Digital Watermarking,2001,81(6):1141-1175.

二级参考文献16

  • 1[1]I J Cox,M L Miller,A L Mckellips. Watermarking as communications with side information[J].PROCEEDINGS OF THE IEEE,1999;87(7):1121~1141
  • 2[2]M H M Costa. Writing on dirty paper[J].IEEE Transactions on Information Theory, 1983 ;29:439~441
  • 3[3]P Moulin,Joseph A O'Sullivan. Information-Theoretic Analysis of Information Hiding[J].IEEE TRANSACTIONS ON INFORMATION THEORY,2003 ;49(3)
  • 4[4]P Moulin, A Briassouli, H Malvar. Detection-Theoretic Analysis of Desynchronization Attacks in Watermarking[J].IEEE,2002
  • 5[5]A Briassouli,P Moulin. Detection-theoretic analysis of warping attacks in spread-spectrum watermarking.available at http://www.ifp.uiuc.edu/~moulin/paper.html
  • 6[6]C Cachin. An Information-Theoretic Model for Steganography[C].In:D Aucsmith ed. Proceedings of 2nd Workshop on Information Hiding,Lecture Notes in Computer Science,Springer, 1998
  • 7[1]Barni M,Bartolini F, De Rosa A, et al. Capacity of full frame DCT image watermarks[J]. IEEE Transactions on Image Processing, 2000, 9(8): 1450-1455.
  • 8[2]Moulin P, O 'Sullivan J A. Information-theoretic analysis of watermarking [A]. 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing[C]. 2000. 3630-3633.
  • 9[3]Cohen A S, Lapidoth A. The Gaussian watermarking game [J]. IEEE Transactions on Information Theory,2002, 48 (6): 1639-1667.
  • 10[4]Somekh-Baruch A, Merhav N. On the capacity game of public watermarking systems [J]. IEEE International Symposium on Information Theory, 2002, 223.

共引文献4

同被引文献18

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部