Home
 Mirror Sites
 General Information
 Confernce Schedule
 Technical Program
 Tutorials
 Industry Technology Tracks
 Exhibits
 Sponsors
 Registration
 Coming to Phoenix
 Call for Papers
 Author's Kit
 On-line Review
 Future Conferences
 Help
|
Abstract: Session SPEC-3 |
|
SPEC-3.1
|
An Information-Theoretic Approach to the Design of Robust Digital Watermarking Systems
Brian Chen,
Gregory W Wornell (Massachusetts Institute of Technology)
A variety of emerging applications require the design of systems for
embedding one signal within another signal. We describe a new class
of embedding methods called quantization index modulation (QIM) and
develop a realization termed coded dither modulation in which the
embedded information modulates the dither signal of a dithered
quantizer. We also develop a framework in which one can analyze
performance trade-offs among robustness, distortion, and embedding
rate, and we show that QIM systems have considerable performance
advantages over previously proposed spread-spectrum and low-bit
modulation systems.
|
SPEC-3.2
|
A Rotation, Scale and Translation Resilient Public Watermark
Min Wu (Princeton University),
Matt Miller,
Jeffrey Bloom (Signafy Inc.),
Ingemar J Cox (NEC Research Institute)
Watermarking algorithms that are robust to the common geometric
transformations of rotation, scale and translation (RST) have been
reported for cases in which the original unwatermarked content is
available at the detector so as to allow the transformations to be
inverted. However, for public watermarks the problem is significantly
more difficult since there is no original content to register with.
Two classes of solution have been proposed. The first embeds a
registration pattern into the content while the second seeks to apply
detection methods that are invariant to these geometric
transformations. This paper describes a public watermarking method
which is invariant (or bares simple relation) to the common geometric
transforms of rotation, scale, and translation. It is based on the
Fourier-Mellin transform which has previously been suggested. We
extend this work, using a variation based on the Radon transform.
The watermark is inserted into a projection of the image. The
properties of this projection are such that RST transforms produce
simple or no effects on the projection waveform. When a watermark is
inserted into a projection, the signal must eventually be back
projected to the original image dimensions. This is a one to many
mapping that allows for considerable flexibility in the watermark
insertion process.
We highlight some theoretical and practical issues that affect the
implementation of an RST invariant watermark. Finally, we describe
preliminary experimental results.
|
SPEC-3.3
|
If One Watermark is Good, Are More Better?
Fred Mintzer,
Gordon W Braudaway (IBM T. J. Watson Research Center)
Invisible watermarks are not all alike. Different techniques are used
to embed different types of watermarks into digital media objects to
accomplish different goals. Some watermarks are intended to robustly
carry ownership information; some are intended to carry
content-verification information; and some are intended to convey side
information, or captions. In this talk, some opportunities to employ
multiple watermarks to convey multiple sets of information, intended
to satisfy differing or similar goals, are examined. Problems
presented by the insertion of multiple watermarks are discussed.
Progress towards developing techniques that embed multiple watermarks
into an image will also be presented.
|
SPEC-3.4
|
Detecting Electronic Watermarks in Digital Video
Jean-Paul Linnartz,
Ton Kalker,
Jaap Haitsma (Philips Research)
Electronic watermarking is an active area of research with many
applications bei ng foreseen. Watermarks may be come an essential tool
for copy management in future Con sumer Electronic or PC devices. With
simple circuits, de tection of watermarks after noise addition, MPEG
com pression, D/A conversion, pixel shifts appears feasible, but
detection after tra nsformations, such as cropping and stretching,
remains a challenge. We propose a model to evaluate the effect of
scaling on the detector reliability and verify it with experiments.
|
SPEC-3.5
|
Data Embedding in Audio: Where Do We Stand
Ahmed H Tewfik,
Mitchell D Swanson,
Bin Zhu (University of Minnesota)
Data embedding algorithms embed binary streams in host multimedia signals.
The embedded data can add features to the host multimedia signal or provide
copyright protection. We review requirements for transparent data embedding
techniques in audio signals. We describe and contrast current approaches to
data embedding in audio. In particular, we emphasize the advantages and
limitations of the various approaches. we also describe possible signal
processing and protocol level attacks on audio watermarking algorithms. We
conclude with a discussion of future research directions.
|
SPEC-3.6
|
The Business Case for Audio Watermarking
Paul Jessop (Intl. Federation of the Phonographic Industry)
This presentation will review the applications of audio watermarking
for the recording industry. It will examine the reasons for placing
watermarks in sound recordings, the benefits which might result and
the potential hazards which need to be overcome. It will cover the
objectives, methodology and results of the MUSE project, one of whose
tasks was the evaluation of ``embedded signaling'' systems. Finally,
it will look at recent developments in the adoption of watermarking in
the recording industry.
|
|