Advertisement

Performance Analysis of CDMA-Based Watermarking with Quantization Scheme

  • Yanmei Fang
  • Limin Gu
  • Jiwu Huang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3439)

Abstract

In most existing spread spectrum watermarking algorithms, the embedding parameters, such as the embedding strength and spreading code length, are frequently determined via experiments. In this paper, the theoretical formulas that associate the embedding strength with the user number, or with the spreading code length, are estimated and tested, by analyzing the CDMA (Code Division Multiple Access) spreading strategies in quantization-based data hiding scenario. Moreover, a performance analytical schema in terms of BER (bit error rate) and SNR (signal-to-noise ratio) is proposed and tested both theoretically and experimentally. The interesting conclusions show that the performance of the CDMA-based data-hiding systems, focusing on quantization scheme, is independent of the user number under the constraints of imperceptibility, and an increase of the spreading code length will lead to a decrease of the robust performance. The simulation results are presented to support the conclusions. Although the work presented in this paper focuses on image watermarking, it may be extended to audio/video watermarking.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2001)Google Scholar
  2. 2.
    Fang, Y., Huang, J.: Image Watermarking Algorithm Applying CDMA. In: Proc. of IEEE Int. Sym. on Circuits and Systems, Bangkok, Thailand, vol. 2(5), pp. 948–951 (2003)Google Scholar
  3. 3.
    Joseph, J.K., Ruanaidh, Ò., Thierry, P.: Rotation, Scale and Translation Invariant Spread Spectrum Digital Image Watermarking. Signal Processing 66(3), 303–317 (1998)zbMATHCrossRefGoogle Scholar
  4. 4.
    Silvestre, G.C.M., Dowling, W.J.: Embedding Data in Digital Images Using CDMA Techniques. In: Proc. of IEEE Int. Conf. on Image Processing, Vancouver, Canada, vol. 1, pp. 589–592 (2000)Google Scholar
  5. 5.
    Kohda, T., Ookubo, Y., Shinokura, K.: Digital Watermarking Through CDMA Channels Using Spread Spectrum Techniques. In: IEEE 6th Int. Sym. on Spread Spectrum Techniques and Applications, Parsippany, NJ, USA, vol. 2, pp. 671–674 (2000)Google Scholar
  6. 6.
    Vassaux, B., Bas, P., Chassery, J.M.: A New CDMA Technique for Digital Image Watermarking Enhancing Capacity of Insertion and Robustness. In: Proc. of IEEE Int. Conf. on Image Processing, Thessalonica, Greece, vol. 3, pp. 983–986 (2001)Google Scholar
  7. 7.
    Bijan, G.M.: Exploring CDMA for Watermarking of Digital Video, Villanova, PA, USA, 19085, http://www.ece.villanova.edu/~mobasser/mypage/3657-10.pdf
  8. 8.
    Bijan, G.M.: Direct Sequence Watermarking of Digital Video Using m-frames. In: Proc. of IEEE Int. Conf. on Image Processing, Chicago, Illinois, USA, vol. 2, pp. 399–403 (1998)Google Scholar
  9. 9.
    Gu, L.M., Huang, J.W., Shi, Y.Q.: Analysis of the Role Played by Error Correcting Coding in Robust Watermarking. In: Proc. of IEEE Int. Sym. on Circuits and Systems, vol. 3(5), pp. 798–801 (2003)Google Scholar
  10. 10.
    Sencar, H.T., Ramkumar, M., Akansu, A.N.: A Robust Type-III Data Hiding Technique against Cropping & Resizing Attacks. In: Proc. of IEEE Int. Sym. on Circuits and Systems, vol. 2(5), pp. 444–446 (2002)Google Scholar
  11. 11.
    Tsai, M.J., Yu, K.Y., Chen, Y.Z.: Joint Wavelet and Spatial Transformation for Digital Watermarking. IEEE Trans. On Consumer Electronics 46(1), 241–245 (2000)Google Scholar
  12. 12.
    Liu, R.Z., Tan, T.N.: A General Watermark Framework for Optimal Energy Estimation, Chinese J. Computer 24(3), 242–246 (2001)Google Scholar
  13. 13.
    Cao, Z.G., Qian, Y.S.: The Principle of Modern Communication. Tsinghua University Press, Beijing (1992)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Yanmei Fang
    • 1
    • 2
  • Limin Gu
    • 1
    • 3
  • Jiwu Huang
    • 1
    • 2
  1. 1.School of Information Science and TechnologySun Yat-Sen UniversityGuangzhouP.R. China
  2. 2.The Guangdong Key Laboratory of Information Security Technology 
  3. 3.Beijing Research and Development CenterChina Construction BankBeijing

Personalised recommendations