Abstract
This paper summarizes considerations and rationales for the design of a watermark detector. In particular, we relate watermark detection to the problem of signal detection in the presence of (structured) noise. The paper builds on the mathematical results from several previously published papers (by our own research group or by others) to verify and support our discussion. In an attempt to unify the theoretical analysis of watermarking schemes, we propose several extensions which clarify the interrelations between the various schemes.
New results include the matched filter with whitening, where we consider the effect of the image and watermark spectra and imperfect setting of filter coefficients. The paper reflects our practical experience in developing watermarking systems for DVD copy protection and broadcast monitoring. The aim of this paper is to further develop the insight in the performance of watermark detectors, to discuss appropriate models for their analysis and to provide an intuitive rationale for making design choices for a watermark detector.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Kalker, T., Depovere, G., Haitsma, J., Maes, M.J.: A video watermarking system for broadcast monitoring. In: Proceedings of SPIE, Security and Watermarking of Multimedia Content, vol. 3657, pp. 103–112 (1999)
Linnartz, J.P.M.G.: The ticket concept for copy control based on embedded signalling. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 257–274. Springer, Heidelberg (1998)
Bloom, J., Cox, I.J., Kalker, A.A.C., Linnartz, J.P.M.G., Miller, M., Traw, B.: Copy Protection for DVD. IEEE Proceedings, Special issue on Information and Protection of Multimedia Information 87(7), 1267–1266 (1999)
Cox, I.J., Miller, M.L.: A review of watermarking and the importance of perceptual modeling. In: Proc. of Electronic Imaging 1997 (February 1997)
Cox, I.J., Linnartz, J.P.M.G.: Some general methods for tampering with watermarks. IEEE Journ. of Sel. Areas in Comm. 16(4), 587–593 (1998)
Cox, I.J., Miller, M.L., McKellips, A.L.: Watermarking as communications with side information. In: IEEE Proc., 87th edn., pp. 1127–1141.
Linnartz, J.P.M.G., Kalker, A.C.C., Depovere, G.F.: Modelling the false-alarm and missed detection rate for electronic watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)
Linnartz, J.P.M.G., Kalker, A.C.C., Depovere, G.F., Beuker, R.: A reliability model for detection of electronic watermarks in digital images. In: Benelux Symposium on Communication Theory, Enschede, October 1997, pp. 202–209 (1997)
Jayant, N.S., Noll, P.: Digital Coding of waveforms, vol. 255. Prentice Hall, Englewood Cliffs (1984)
Pitas, I., Kaskalis, T.: Signature Casting on Digital Images. In: Proceedings IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras (June 1995)
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3/4) (1996)
Bender, W., Gruhl, D., Morimoto, N.: Techniques for Data Hiding. In: Proceedings of the SPIE, San Jose CA, USA, February 1995, pp. 2420–40 (1995)
Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Proc. Workshop on Information Hiding, May 30 - June 1, pp. 175–190. Univ. of Cambridge, U.K (1996)
Wozencraft, J., Jacobs, I.: Principles of Communication Engineering. Wiley, Chichester (1965)
Miller, M.L., Bloom, J.A.: Computing the probability of false watermark detection. In: Proc. Workshop on Information Hiding 1999, Dresden (1999)
Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Proc. Workshop on Information Hiding, May 30 - June 1, pp. 175–190. Univ. of Cambridge, U.K (1996)
Maes, M.: Twin peaks: the histogram attack on fized depth watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 290–305. Springer, Heidelberg (1998)
Wireless Communication. In: The Interactive MultiMedia CD ROM, 3rd Edition, Baltzer Science Publishers, Amsterdam (1999), http://www.baltzer.nl/wirelesscd
Marvel, L.M., Boncelet, C.G., Retter, C.T.: In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 48–61. Springer, Heidelberg (1998)
Hernandez, J.R., Perez-Gonzalez, F., Rodriguez, J.M., Nieto, G.: Performance analysius of a 2D Multipulse Amplitude Modulation Scheme for data hiding and watermarking of still images. IEEE JSAC, May 1998 Vol.16(4), 510–524 (1998)
Langelaar, G.C., van der Lubbe, J.C.A., Biemond, J.: Copy protection for multimedia data based on labeling techniques. In: 17th Symposium on Information Theory in the Benelux, Enschede, The Netherlands (May 1996)
Depovere, G.F.G., Kalker, A.C.C., Linnartz, J.P.M.G.: Improved watermark detection reliability using filtering before correlation. In: Int. Conf. on Image Processing, ICIP, Chicago IL (October 1998)
Langelaar, G., Lagendijk, R., Biemond, J.: Removing Spread Spectrum Watermarks. In: Proceedings of Eusipco-1998, Rhodes, vol. IV, pp. 2281–2284 (1998)
Lipshitz, S.P., Wannamaker, R.A., Vanderkooy, J.: Quantization and Dither: A theoretical survey. J. Audio Eng. Soc 40(5), 355–375 (1992)
Kalker, T., Janssen, A.J.E.M.: Analysis of SPOMF Detection. Accepted at ICIP 1999, Kobe, Japan (1999)
Linnartz, J.P.M.G., Kalker, A.A.C., Haitsma, J.: Detecting electronic watermarks in digital video. In: Paper 3010, Invited paper for special session at ICCASP 1999, Phoenix, AR (March 1999)
Wu, M., Miller, M., Bloom, J., Cox, I.: Watermark detection and normalized correlation. Presented at ICCASP 1999, Phoenix (March 1999); at DSP Conference in Florance
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Linnartz, JP., Depovere, G., Kalker, T. (2000). On the Design of a Watermarking System: Considerations and Rationales. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_18
Download citation
DOI: https://doi.org/10.1007/10719724_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67182-4
Online ISBN: 978-3-540-46514-0
eBook Packages: Springer Book Archive