Authors:
Brian Chen,
Gregory W Wornell,
Page (NA) Paper number 3007
Abstract:
A variety of emerging applications require the design of systems for
embedding one signal within another signal. We describe a new class
of embedding methods called quantization index modulation (QIM) and
develop a realization termed coded dither modulation in which the embedded
information modulates the dither signal of a dithered quantizer. We
also develop a framework in which one can analyze performance trade-offs
among robustness, distortion, and embedding rate, and we show that
QIM systems have considerable performance advantages over previously
proposed spread-spectrum and low-bit modulation systems.
Authors:
Min Wu,
Matt L. Miller,
Jeffrey A. Bloom,
Ingemar J Cox,
Page (NA) Paper number 3008
Abstract:
Watermarking algorithms that are robust to the common geometric transformations
of rotation, scale and translation (RST) have been reported for cases
in which the original unwatermarked content is available at the detector
so as to allow the transformations to be inverted. However, for public
watermarks the problem is significantly more difficult since there
is no original content to register with. Two classes of solution have
been proposed. The first embeds a registration pattern into the content
while the second seeks to apply detection methods that are invariant
to these geometric transformations. This paper describes a public watermarking
method which is invariant (or bares simple relation) to the common
geometric transforms of rotation, scale, and translation. It is based
on the Fourier-Mellin transform which has previously been suggested.
We extend this work, using a variation based on the Radon transform.
The watermark is inserted into a projection of the image. The properties
of this projection are such that RST transforms produce simple or no
effects on the projection waveform. When a watermark is inserted into
a projection, the signal must eventually be back projected to the original
image dimensions. This is a one to many mapping that allows for considerable
flexibility in the watermark insertion process. We highlight some theoretical
and practical issues that affect the implementation of an RST invariant
watermark. Finally, we describe preliminary experimental results.
Authors:
Fred Mintzer,
Gordon W Braudaway,
Page (NA) Paper number 3009
Abstract:
Invisible watermarks are not all alike. Different techniques are used
to embed different types of watermarks into digital media objects to
accomplish different goals. Some watermarks are intended to robustly
carry ownership information; some are intended to carry content-verification
information; and some are intended to convey side information, or captions.
In this talk, some opportunities to employ multiple watermarks to convey
multiple sets of information, intended to satisfy differing or similar
goals, are examined. Problems presented by the insertion of multiple
watermarks are discussed. Progress towards developing techniques that
embed multiple watermarks into an image will also be presented.
Authors:
Jean-Paul Linnartz,
Ton Kalker,
Jaap Haitsma,
Page (NA) Paper number 3010
Abstract:
Electronic watermarking is an active area of research with many applications
bei ng foreseen. Watermarks may be come an essential tool for copy
management in future Con sumer Electronic or PC devices. With simple
circuits, de tection of watermarks after noise addition, MPEG com pression,
D/A conversion, pixel shifts appears feasible, but detection after
tra nsformations, such as cropping and stretching, remains a challenge.
We propose a model to evaluate the effect of scaling on the detector
reliability and verify it with experiments.
Authors:
Ahmed H Tewfik,
Mitchell D Swanson,
Bin Zhu,
Page (NA) Paper number 3011
Abstract:
Data embedding algorithms embed binary streams in host multimedia signals.
The embedded data can add features to the host multimedia signal or
provide copyright protection. We review requirements for transparent
data embedding techniques in audio signals. We describe and contrast
current approaches to data embedding in audio. In particular, we emphasize
the advantages and limitations of the various approaches. we also describe
possible signal processing and protocol level attacks on audio watermarking
algorithms. We conclude with a discussion of future research directions.
Authors:
Paul Jessop,
Page (NA) Paper number 3012
Abstract:
This presentation will review the applications of audio watermarking
for the recording industry. It will examine the reasons for placing
watermarks in sound recordings, the benefits which might result and
the potential hazards which need to be overcome. It will cover the
objectives, methodology and results of the MUSE project, one of whose
tasks was the evaluation of ``embedded signaling'' systems. Finally,
it will look at recent developments in the adoption of watermarking
in the recording industry.
|