An introduction to signal detection and estimation (2nd ed.)
An introduction to signal detection and estimation (2nd ed.)
Asymptotic approximations of integrals
Asymptotic approximations of integrals
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
Expanding the class of watermark de-synchronization attacks
Proceedings of the 9th workshop on Multimedia & security
EURASIP Journal on Information Security
Improved spread spectrum: a new modulation technique for robust watermarking
IEEE Transactions on Signal Processing
IEEE Transactions on Signal Processing
Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding
IEEE Transactions on Signal Processing
Rational dither modulation: a high-rate data-hiding method invariant to gain attacks
IEEE Transactions on Signal Processing - Part II
Signaling methods for multimedia steganography
IEEE Transactions on Signal Processing
Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking
IEEE Transactions on Information Forensics and Security
A Constructive and Unifying Framework for Zero-Bit Watermarking
IEEE Transactions on Information Forensics and Security
Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks
IEEE Transactions on Information Forensics and Security
A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Theory
Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources
IEEE Transactions on Information Theory
IEEE Transactions on Image Processing
A new decoder for the optimum recovery of nonadditive watermarks
IEEE Transactions on Image Processing
Detection for multiplicative watermarking in DCT domain by Cauchy model
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Hi-index | 754.84 |
The problem of optimum watermark embedding and detection was addressed in a recent paper by Merhav and Sabbag, where the optimality criterion was the maximum false-negative error exponent subject to a guaranteed false-positive error exponent. In particular, Merhav and Sabbag derived universal asymptotically optimum embedding and detection rules under the assumption that the detector relies solely on second-order joint empirical statistics of the received signal and the watermark. In the case of a Gaussian host signal and a Gaussian attack, however, closed-form expressions for the optimum embedding strategy and the false-negative error exponent were not obtained in that work. In this paper, we derive the false-negative error exponent for any given embedding strategy and use such a result to show that in general the optimum embedding rule depends on the variance of the host sequence and the variance of the attack noise. We then focus on high signal-to-noise ratio (SNR) regime, deriving the optimum embedding strategy for such a setup. In this case, a universally optimum embedding rule turns out to exist and to be very simple with an intuitively appealing geometrical interpretation. The effectiveness of the newly proposed embedding strategy is evaluated numerically.