Design and statistical analysis of a hash-aided image watermarking system

This paper develops a joint hashing/watermarking scheme in which a short hash of the host signal is available to a detector. Potential applications include content tracking on public networks and forensic identification. The host data into which the watermark is embedded are selected from a secret s...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society. - 1992. - 13(2004), 10 vom: 15. Okt., Seite 1393-408
1. Verfasser: Cannons, Jillian (VerfasserIn)
Weitere Verfasser: Moulin, Pierre
Format: Aufsatz
Sprache:English
Veröffentlicht: 2004
Zugriff auf das übergeordnete Werk:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Schlagworte:Comparative Study Evaluation Study Journal Article Research Support, U.S. Gov't, Non-P.H.S. Validation Study
LEADER 01000caa a22002652c 4500
001 NLM151352046
003 DE-627
005 20250205220124.0
007 tu
008 231223s2004 xx ||||| 00| ||eng c
028 5 2 |a pubmed25n0505.xml 
035 |a (DE-627)NLM151352046 
035 |a (NLM)15462148 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Cannons, Jillian  |e verfasserin  |4 aut 
245 1 0 |a Design and statistical analysis of a hash-aided image watermarking system 
264 1 |c 2004 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
500 |a Date Completed 04.11.2004 
500 |a Date Revised 10.12.2019 
500 |a published: Print 
500 |a Citation Status MEDLINE 
520 |a This paper develops a joint hashing/watermarking scheme in which a short hash of the host signal is available to a detector. Potential applications include content tracking on public networks and forensic identification. The host data into which the watermark is embedded are selected from a secret subset of the full-frame discrete cosine transform of an image, and the watermark is inserted through multiplicative embedding. The hash is a binary version of selected original image coefficients. We propose a maximum likelihood watermark detector based on a statistical image model. The availability of a hash as side information to the detector modifies the posterior distribution of the marked coefficients. We derive Chernoff bounds on the receiver operating characteristic performance of the detector. We show that host-signal interference can be rejected if the hash function is suitably designed. The relative difficulty of an eavesdropper's detection problem is also determined; the eavesdropper does not know the secret key used. Monte Carlo simulations are performed using photographic test images. Finally, various attacks on the watermarked image are introduced to study the robustness of the derived detectors. The joint hashing/watermarking scheme outperforms the traditional "hashless" watermarking technique 
650 4 |a Comparative Study 
650 4 |a Evaluation Study 
650 4 |a Journal Article 
650 4 |a Research Support, U.S. Gov't, Non-P.H.S. 
650 4 |a Validation Study 
700 1 |a Moulin, Pierre  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t IEEE transactions on image processing : a publication of the IEEE Signal Processing Society  |d 1992  |g 13(2004), 10 vom: 15. Okt., Seite 1393-408  |w (DE-627)NLM09821456X  |x 1941-0042  |7 nnas 
773 1 8 |g volume:13  |g year:2004  |g number:10  |g day:15  |g month:10  |g pages:1393-408 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_NLM 
912 |a GBV_ILN_350 
951 |a AR 
952 |d 13  |j 2004  |e 10  |b 15  |c 10  |h 1393-408