失真补偿量化索引调制水印的性能分析
doi: 10.3724/SP.J.1146.2008.01774
Performance Analysis of Distortion-Compensated QIM Watermarking
-
摘要: 该文分析了基于量化索引调制的失真补偿水印方案中量化步长的伸缩因子与失真度、鲁棒性和检测误码率之间的关系。在高分辨率量化的假设前提下,推导出失真补偿量化索引调制水印算法在加性高斯白噪声信道下的误码率计算公式,并提出了一个失真-鲁棒性函数来度量算法的抗噪鲁棒性和失真度与鲁棒性之间的代价关系。通过计算机仿真,比较了不同失真补偿量化索引调制水印方案下算法的失真-鲁棒性能和误码率性能;并以一段音频数据三级小波细节系数为载体嵌入水印信息,统计检测时的位错误率。实验结果验证了在低量化步长范围内,理论预测误码率与实验检测误码率较为吻合,失真-鲁棒性函数能够很好地度量高分辨率量化前提下的算法抗噪鲁棒性和失真度与鲁棒性之间的代价关系。Abstract: Concerning the distortion, robustness and decoding error probability, this paper analyses the performance of Distortion-Compensated Quantization Index Modulation (DC-QIM) watermarking scheme with a scaling factor of step. On the assumption that quantization is high resolution, a formula of decoding error probability for DC-QIM watermarking scheme is derived under the Additive White Gaussian Noise (AWGN) channel, and a distortion-robustness function is defined as a criterion characterizing the tradeoff between distortion and the robustness. In the experiment, several audio sections are selected as the hosts and their third lever wavelet detail coefficients are quantified according to watermark bit series. In term of the distortion-robustness and decoding error probability, which of different DC-QIM schemes are compared, simulation result and experimental value are in accord with predictive one when step is on the small side.
-
[1] Chen B and Wornell G. Dither modulation: A new approachto digital watermarking and information embedding. Proc. ofSPIE[C]: Security and Watermarking of MultimediaContents. 1999, Vol.3657: 342-353. [2] Chen B and Wornell G. Quantization index modulation: Aclass of provably good methods for digital watermarking andinformation embedding[J].IEEE Transactions onInformation Theory.2001, 47(4):1423-1443 [3] Costa M H M. Writing on dirty paper[J]. IEEE Transactionson Information Theory, 1983, IT-29(3): 439-441. [4] Prez-Gonzlez F, Balado F, and Hernndez J R.Performance analysis of existing and new methods for datahiding with known-host information in additive channels[J].IEEE Transactions on Signal Processing.2003, 51(4):960-980 [5] Vila-Force J E, Voloshynovskiy S, and Koval O. Quantization-based methods: additive attacks performance analysis[J].LNCS, 2008, 4920: 70-90. [6] 肖俊, 王颖, 李象霖. 带失真补偿的抖动调制水印算法中的补偿因子研究[J]. 电子学报, 2007, 35(4): 786-790.Xiao J, Wang Y, and Li X L. Study on thecompensation factor in the watermarking algorithm ofdither modulation with distortion compensation[J].Acta Electronica Sinica, 2007, 35(4): 786-790. [7] Merhav N and Sabbag E. Optimal watermark embedding anddetection strategies under limited detection resources[J].IEEE Transactions on Information Theory.2008, 54(1):255-274 [8] Sencar H T, Ramkumar M, and Akansu A N. An overview ofscalar quantization based data hiding methods[J]. SignalProcessing, 2006, 86(5): 893-914. [9] Gray R M and Neuhoff D L. Quantization[J].IEEETransactions on Information Theory.1998, 44(6):2325-2383
计量
- 文章访问数: 3887
- HTML全文浏览量: 101
- PDF下载量: 805
- 被引次数: 0