Concerning the distortion, robustness and decoding error probability, this paper analyses the performance of Distortion-Compensated Quantization Index Modulation (DC-QIM) watermarking scheme with a scaling factor of step. On the assumption that quantization is high resolution, a formula of decoding error probability for DC-QIM watermarking scheme is derived under the Additive White Gaussian Noise (AWGN) channel, and a distortion-robustness function is defined as a criterion characterizing the tradeoff between distortion and the robustness. In the experiment, several audio sections are selected as the hosts and their third lever wavelet detail coefficients are quantified according to watermark bit series. In term of the distortion-robustness and decoding error probability, which of different DC-QIM schemes are compared, simulation result and experimental value are in accord with predictive one when step is on the small side.
[1] Chen B and Wornell G. Dither modulation: A new approachto digital watermarking and information embedding. Proc. ofSPIE[C]: Security and Watermarking of MultimediaContents. 1999, Vol.3657: 342-353. [2] Chen B and Wornell G. Quantization index modulation: Aclass of provably good methods for digital watermarking andinformation embedding[J].IEEE Transactions onInformation Theory.2001, 47(4):1423-1443 [3] Costa M H M. Writing on dirty paper[J]. IEEE Transactionson Information Theory, 1983, IT-29(3): 439-441. [4] Prez-Gonzlez F, Balado F, and Hernndez J R.Performance analysis of existing and new methods for datahiding with known-host information in additive channels[J].IEEE Transactions on Signal Processing.2003, 51(4):960-980 [5] Vila-Force J E, Voloshynovskiy S, and Koval O. Quantization-based methods: additive attacks performance analysis[J].LNCS, 2008, 4920: 70-90. [6] 肖俊, 王颖, 李象霖. 带失真补偿的抖动调制水印算法中的补偿因子研究[J]. 电子学报, 2007, 35(4): 786-790.Xiao J, Wang Y, and Li X L. Study on thecompensation factor in the watermarking algorithm ofdither modulation with distortion compensation[J].Acta Electronica Sinica, 2007, 35(4): 786-790. [7] Merhav N and Sabbag E. Optimal watermark embedding anddetection strategies under limited detection resources[J].IEEE Transactions on Information Theory.2008, 54(1):255-274 [8] Sencar H T, Ramkumar M, and Akansu A N. An overview ofscalar quantization based data hiding methods[J]. SignalProcessing, 2006, 86(5): 893-914. [9] Gray R M and Neuhoff D L. Quantization[J].IEEETransactions on Information Theory.1998, 44(6):2325-2383