Real Data Performance Evaluation of CAISS Watermarking Scheme

  • Piotr Guzik
  • Andrzej Matiolański
  • Andrzej Dziech
Part of the Communications in Computer and Information Science book series (CCIS, volume 287)

Abstract

In this paper we present real data Bit Error Rate (BER) performance tests of recently proposed corelation-and-bit-aware improved spread spectrum (CAISS) watermarking scheme [8]. Our tests were performed in DCT domain. The results show significant improvement as compared with traditional spread spectrum technique applied to the same and identically prepared data. Tests performed under medium JPEG compression and fixed Peak Signal-to-Noise Ratio (PSNR) level indicate that appropriate choice of CAISS parameters results in over a two orders of magnitude smaller BER as compared with spread spectrum technique without side information about correlation. We also compared CAISS with improved spread spectrum scheme and found that CAISS can perform approximately two times better than ISS (in terms of BER) after medium JPEG compression.

Keywords

Watermarking Spread Spectrum DCT domain 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chen, B., Wornell, G.W.: Quantization index modulation methods for digital watermarking and information embedding of multimedia. J. VLSI Signal Process. Syst. 27(1/2), 7–33 (2001)MATHCrossRefGoogle Scholar
  2. 2.
    Cheng, Q., Huang, T.S.: An additive approach to transform-domain information hiding and optimum detection structure. IEEE Transactions on Multimedia 3(3), 273–284 (2001)CrossRefGoogle Scholar
  3. 3.
    Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  4. 4.
    Malvar, H.S., Florencio, D.A.: An improved spread spectrum technique for robust watermarking. In: 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 4, pp. IV–3301–IV–3304 (May 2002)Google Scholar
  5. 5.
    opcjonalny opcjonalny. Bows2-original data-base. opcjonalny, opcjonalny opcjonalny. opcjonalnyGoogle Scholar
  6. 6.
    Reininger, R., Gibson, J.: Distributions of the two-dimensional dct coefficients for images. IEEE Transactions on Communications 31(6), 835–839 (1983)CrossRefGoogle Scholar
  7. 7.
    Valizadeh, A., Wang, Z.J.: A framework of multiplicative spread spectrum embedding for data hiding: Performance, decoder and signature design. In: IEEE Global Telecommunications Conference, GLOBECOM 2009, November 30-December 4, pp. 1–6 (2009)Google Scholar
  8. 8.
    Valizadeh, A., Wang, Z.J.: Correlation-and-bit-aware spread spectrum embedding for data hiding. IEEE Transactions on Information Forensics and Security 6(2), 267–282 (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Piotr Guzik
    • 1
  • Andrzej Matiolański
    • 1
  • Andrzej Dziech
    • 1
  1. 1.Department of TelecommunicationAGH University of Science and TechnologyCracowPoland

Personalised recommendations