Advanced Search
Volume 28 Issue 5
Aug.  2010
Turn off MathJax
Article Contents
Wang Ying, Li Xiang-lin. An Overview of the Capacity of Digital Watermarking[J]. Journal of Electronics & Information Technology, 2006, 28(5): 955-960.
Citation: Wang Ying, Li Xiang-lin. An Overview of the Capacity of Digital Watermarking[J]. Journal of Electronics & Information Technology, 2006, 28(5): 955-960.

An Overview of the Capacity of Digital Watermarking

  • Received Date: 2004-12-07
  • Rev Recd Date: 2005-05-08
  • Publish Date: 2006-05-19
  • The diversified researches of capacity of digital watermarking are summarized in this paper. The capacity of watermarking as a basic communication system, the capacity as side information, the capacity using dirty paper encoding and the capacity of security watermarking are introduced. An effective conclusion for designing the arithmetic of embedding and detecting is found by analysis the capacity.
  • loading
  • Cox I J, Miller M L, Bloom J M. Digital Watermarking. United States of America, Mordan Kaufmann Publishers, 2002, chapter 1-2.[2]Perez-Gonzalea F, Hernandes J R, Balado F. Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications. Signal Processing 2001, 81(6): 1215-1238.[3]Su J K, Eggers J J, Girod B. Capacity of digital watermarks subjected to an optimal collusion attack. European Signal Processing Conference(EUSIPCO), Tampere, Finland, September 2000.[4]Eggers J J, Bauml R R, Girod B. Digital watermarking facing attacks by amplitude scaling and additive white noise. 4th Intl. ITG Conference on Source and Channel Coding, Berlin, Jan. 2002: 28-30.[5]Moulin P, OSullivan J A. Information-Theoretic Analysis of Information Hiding[J].IEEE Trans. on Information Theory.2003, 49(3):563-593[6]Moulin P, OSullivan J A. Information-theoretic analysis of watermarking. in Proceedings of the International Conference on Acoustics, Speech, and Signal processing, 2000, 6: 3630-3633.[7]OSullivan J A, Moulin P, Ettinger J M. Information-theoretic analysis of steganography. Proceedings of the IEEE International Symposium on Information Theory, Boston, Aug. 1998.[8]Eggers J J, Bauml R, Girod B. A communications approach to image steganography. Proceedings of SPIE Vol.4675, Security and Watermarking of Multimedia Contents IV, San Jose, Ca., Jan., 2002.[9]Cachin C. An information-theoretic model for steganography. Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, Springer, 1998: 306-318.[10]傅祖芸. 信息论基础理论及应用. 北京: 电子工业出版社,2001: 90-111.[11]Cox I J, Kilian J, Leightom T, Shamoon T. Secure spread spectrum watermarking for multimedia[J].IEEE Trans. on Image Processing.1997, 6(12):1673-1687[12]Cox I J, Miller M L, McKellips A. Watermarking as communications with side information[J].Proceedings of the IEEE.1999, 87(7):1127-1141[13]Chen B, Wornell G W. Achievable performance of digital watermarking systems. In Proceeding of the IEEE Intl. Conference on Multimedia Computing and Systems (ICMCS'99),[14]Florence, Italy, July 1999, 1: 13-18.[15]Gelfand S I, Pinsker M S. Coding for channel with random[16]Parameters. Problems of Control and Information Theory, 1980,[17]1): 19-31.[18]Costa M. Writing on dirty paper[J].IEEE Trans. on Information Theory.1983, 29(3):439-441[19]Chen B, Wornell G W. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding[J].IEEE Trans. on Information Theory.2001, 47(4):1423-1443[20]Su J K, Eggers J J, Girod B. Andysis of digital watermarks subjected to optimum linear filtering and additive noise[J].Signal Processing.2001, 81(6):1141-1175[21]Chen B, Wornell G W. Dither modulation: a new approach to digital watermarking and information embedding. In Proceeding of SPIE Vol. 3675. Security and Watermarking of Multimedia Contents, San Jose, January 1999.[22]Chen B, Wornell G. Proprocessed and postprocessed quantization index modulation methods for digital watermarking. In Proceeding of SPIE Vol.3971; Security and Watermarking of Multimedia Contents Ⅱ, San Jose, January 2000. [20] Ramkumar M. Data hiding in multimedia: theory and application. Ph. D thesis, New Jersey Institute of Technology, Kearny, NJ, USA, 1999.[23]Moulin P, Mihgak M K. The parallel-gaussian watermarking game. UIUC Technique Report UIUC-ENG-01-2214, June 2001.Moulin P, Ivanovic A. The watermark selection game. Proceeding Conference on Information Sciences and Systems, Baltimore, MD, March 2001.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2587) PDF downloads(1177) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return