首页> 外文OA文献 >Digital watermarking, information embedding, and data hiding systems
【2h】

Digital watermarking, information embedding, and data hiding systems

机译:数字水印,信息嵌入和数据隐藏系统

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Digital watermarking, information embedding, and data hiding systems embed information, sometimes called a digital watermark, inside a host signal, which is typically an image, audio signal, or video signal. The host signal is not degraded unacceptably in the process, and one can recover the watermark even if the composite host and watermark signal undergo a variety of corruptions and attacks as long as these corruptions do not unacceptably degrade the host signal. These systems play an important role in meeting at least three major challenges that result from the widespread use of digital communication networks to disseminate multimedia content: (1) the relative ease with which one can generate perfect copies of digital signals creates a need for copyright protection mechanisms, (2) the relative ease with which one can alter digital signals creates a need for authentication and tamper-detection methods, and (3) the increase in sheer volume of transmitted data creates a demand for bandwidth-efficient methods to either backwards-compatibly increase capacities of existing legacy networks or deploy new networks backwards-compatibly with legacy networks. We introduce a framework within which to design and analyze digital watermarking and information embedding systems. In this framework performance is characterized by achievable rate-distortion-robustness trade-offs, and this framework leads quite naturally to a new class of embedding methods called quantization index modulation (QIM). These QIM methods, especially when combined with postprocessing called distortion compensation, achieve provably better rate-distortion-robustness performance than previously proposed classes of methods such as spread spectrum methods and generalized low-bit modulation methods in a number of different scenarios, which include both intentional and unintentional attacks. Indeed, we show that distortion-compensated QIM methods can achieve capacity, the information-theoretically best possible rate-distortion-robustness performance, against both additive Gaussian noise attacks and arbitrary squared error distortion-constrained attacks. These results also have implications for the problem of communicating over broadcast channels. We also present practical implementations of QIM methods called dither modulation and demonstrate their performance both analytically and through empirical simulations.
机译:数字水印,信息嵌入和数据隐藏系统将有时称为数字水印的信息嵌入到主机信号中,该主机信号通常是图像,音频信号或视频信号。在此过程中,主机信号不会降低到不可接受的程度,即使复合主机和水印信号经历了各种损坏和攻击,只要这些损坏不会使主机信号降低到可接受的水平,就可以恢复水印。这些系统在应对因广泛使用数字通信网络传播多媒体内容而导致的至少三个主要挑战中发挥着重要作用:(1)可以相对容易地生成数字信号的完美副本,因此需要版权保护机制;(2)可以相对容易地更改数字信号,这就需要使用身份验证和篡改检测方法;(3)传输数据量的绝对增加,需要使用带宽高效的方法,要么倒退—兼容地增加现有旧网络的容量或向后部署新网络,与旧网络兼容。我们介绍了一个框架,可以在其中设计和分析数字水印和信息嵌入系统。在此框架中,性能的特点是可以实现速率失真鲁棒性的折衷,并且该框架很自然地导致了一种称为量化指数调制(QIM)的新型嵌入方法。这些QIM方法,特别是与称为失真补偿的后处理结合使用时,在许多不同的情况下都比以前提议的方法类别(例如扩频方法和广义的低比特调制方法)具有可证明更好的速率失真鲁棒性。有意和无意的攻击。确实,我们证明了失真补偿QIM方法可以抵抗加性高斯噪声攻击和任意平方误差失真约束攻击,从而达到信息理论上最佳的速率失真鲁棒性性能。这些结果也对通过广播频道进行通信的问题产生了影响。我们还介绍了称为抖动调制的QIM方法的实际实现,并通过分析和经验仿真来证明其性能。

著录项

  • 作者

    Chen Brian 1972-;

  • 作者单位
  • 年度 2000
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号