Advanced Search
Volume 32 Issue 1
Aug.  2010
Turn off MathJax
Article Contents
Zeng Gao-rong, Qiu Zheng-ding, Zhang Chun-e. Performance Analysis of Distortion-Compensated QIM Watermarking[J]. Journal of Electronics & Information Technology, 2010, 32(1): 86-91. doi: 10.3724/SP.J.1146.2008.01774
Citation: Zeng Gao-rong, Qiu Zheng-ding, Zhang Chun-e. Performance Analysis of Distortion-Compensated QIM Watermarking[J]. Journal of Electronics & Information Technology, 2010, 32(1): 86-91. doi: 10.3724/SP.J.1146.2008.01774

Performance Analysis of Distortion-Compensated QIM Watermarking

doi: 10.3724/SP.J.1146.2008.01774
  • Received Date: 2008-12-24
  • Rev Recd Date: 2009-07-06
  • Publish Date: 2010-01-19
  • Concerning the distortion, robustness and decoding error probability, this paper analyses the performance of Distortion-Compensated Quantization Index Modulation (DC-QIM) watermarking scheme with a scaling factor of step. On the assumption that quantization is high resolution, a formula of decoding error probability for DC-QIM watermarking scheme is derived under the Additive White Gaussian Noise (AWGN) channel, and a distortion-robustness function is defined as a criterion characterizing the tradeoff between distortion and the robustness. In the experiment, several audio sections are selected as the hosts and their third lever wavelet detail coefficients are quantified according to watermark bit series. In term of the distortion-robustness and decoding error probability, which of different DC-QIM schemes are compared, simulation result and experimental value are in accord with predictive one when step is on the small side.
  • loading
  • [1] Chen B and Wornell G. Dither modulation: A new approachto digital watermarking and information embedding. Proc. ofSPIE[C]: Security and Watermarking of MultimediaContents. 1999, Vol.3657: 342-353. [2] Chen B and Wornell G. Quantization index modulation: Aclass of provably good methods for digital watermarking andinformation embedding[J].IEEE Transactions onInformation Theory.2001, 47(4):1423-1443 [3] Costa M H M. Writing on dirty paper[J]. IEEE Transactionson Information Theory, 1983, IT-29(3): 439-441. [4] Prez-Gonzlez F, Balado F, and Hernndez J R.Performance analysis of existing and new methods for datahiding with known-host information in additive channels[J].IEEE Transactions on Signal Processing.2003, 51(4):960-980 [5] Vila-Force J E, Voloshynovskiy S, and Koval O. Quantization-based methods: additive attacks performance analysis[J].LNCS, 2008, 4920: 70-90. [6] 肖俊, 王颖, 李象霖. 带失真补偿的抖动调制水印算法中的补偿因子研究[J]. 电子学报, 2007, 35(4): 786-790.Xiao J, Wang Y, and Li X L. Study on thecompensation factor in the watermarking algorithm ofdither modulation with distortion compensation[J].Acta Electronica Sinica, 2007, 35(4): 786-790. [7] Merhav N and Sabbag E. Optimal watermark embedding anddetection strategies under limited detection resources[J].IEEE Transactions on Information Theory.2008, 54(1):255-274 [8] Sencar H T, Ramkumar M, and Akansu A N. An overview ofscalar quantization based data hiding methods[J]. SignalProcessing, 2006, 86(5): 893-914. [9] Gray R M and Neuhoff D L. Quantization[J].IEEETransactions on Information Theory.1998, 44(6):2325-2383
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3870) PDF downloads(805) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return