Two private, perceptual data-hiding games

Anil Kumar Goteti, Pierre Moulin

Research output: Contribution to journalConference article

Abstract

Perceptual watermarking methods are designed to be transparent and robust to attacks. A perceptual model based on Just Noticeable Difference levels introduces amplitude constraints on the watermark and the noise generated by an attacker. Two problems are considered in this paper: (1) detection performance for embedding a single bit in n data, and (2) Shannon capacity. In both cases the original host data are known to the receiver. Both problems are formulated as games involving a suitable cost function (Bhattacharyya distance and mutual information, respectively). The watermarker and the attacker design probability distributions in order to respectively maximize and minimize the cost function. The optimal distributions are quite different from the uniform distributions that have been previously used in the watermarking literature.

Original languageEnglish (US)
Pages (from-to)III373-III376
JournalICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
Volume3
StatePublished - Sep 28 2004
EventProceedings - IEEE International Conference on Acoustics, Speech, and Signal Processing - Montreal, Que, Canada
Duration: May 17 2004May 21 2004

ASJC Scopus subject areas

  • Software
  • Signal Processing
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Two private, perceptual data-hiding games'. Together they form a unique fingerprint.

  • Cite this