SpacerHome

Spacer
Mirror Sites
Spacer
General Information
Spacer
Confernce Schedule
Spacer
Technical Program
Spacer
     Plenary Sessions
Spacer
     Special Sessions
Spacer
     Expert Summaries
Spacer
     Tutorials
Spacer
     Industry Technology Tracks
Spacer
     Technical Sessions
Spacer
Tutorials
Spacer
Industry Technology Tracks
Spacer
Exhibits
Spacer
Sponsors
Spacer
Registration
Spacer
Coming to Phoenix
Spacer
Call for Papers
Spacer
Author's Kit
Spacer
On-line Review
Spacer
Future Conferences
Spacer
Help

Abstract: Session SPEC-3

Conference Logo

SPEC-3.1  

PDF File of Paper Manuscript
An Information-Theoretic Approach to the Design of Robust Digital Watermarking Systems
Brian Chen, Gregory W Wornell (Massachusetts Institute of Technology)

A variety of emerging applications require the design of systems for embedding one signal within another signal. We describe a new class of embedding methods called quantization index modulation (QIM) and develop a realization termed coded dither modulation in which the embedded information modulates the dither signal of a dithered quantizer. We also develop a framework in which one can analyze performance trade-offs among robustness, distortion, and embedding rate, and we show that QIM systems have considerable performance advantages over previously proposed spread-spectrum and low-bit modulation systems.


SPEC-3.2  

PDF File of Paper Manuscript
A Rotation, Scale and Translation Resilient Public Watermark
Min Wu (Princeton University), Matt Miller, Jeffrey Bloom (Signafy Inc.), Ingemar J Cox (NEC Research Institute)

Watermarking algorithms that are robust to the common geometric transformations of rotation, scale and translation (RST) have been reported for cases in which the original unwatermarked content is available at the detector so as to allow the transformations to be inverted. However, for public watermarks the problem is significantly more difficult since there is no original content to register with. Two classes of solution have been proposed. The first embeds a registration pattern into the content while the second seeks to apply detection methods that are invariant to these geometric transformations. This paper describes a public watermarking method which is invariant (or bares simple relation) to the common geometric transforms of rotation, scale, and translation. It is based on the Fourier-Mellin transform which has previously been suggested. We extend this work, using a variation based on the Radon transform. The watermark is inserted into a projection of the image. The properties of this projection are such that RST transforms produce simple or no effects on the projection waveform. When a watermark is inserted into a projection, the signal must eventually be back projected to the original image dimensions. This is a one to many mapping that allows for considerable flexibility in the watermark insertion process. We highlight some theoretical and practical issues that affect the implementation of an RST invariant watermark. Finally, we describe preliminary experimental results.


SPEC-3.3  

PDF File of Paper Manuscript
If One Watermark is Good, Are More Better?
Fred Mintzer, Gordon W Braudaway (IBM T. J. Watson Research Center)

Invisible watermarks are not all alike. Different techniques are used to embed different types of watermarks into digital media objects to accomplish different goals. Some watermarks are intended to robustly carry ownership information; some are intended to carry content-verification information; and some are intended to convey side information, or captions. In this talk, some opportunities to employ multiple watermarks to convey multiple sets of information, intended to satisfy differing or similar goals, are examined. Problems presented by the insertion of multiple watermarks are discussed. Progress towards developing techniques that embed multiple watermarks into an image will also be presented.


SPEC-3.4  

PDF File of Paper Manuscript
Detecting Electronic Watermarks in Digital Video
Jean-Paul Linnartz, Ton Kalker, Jaap Haitsma (Philips Research)

Electronic watermarking is an active area of research with many applications bei ng foreseen. Watermarks may be come an essential tool for copy management in future Con sumer Electronic or PC devices. With simple circuits, de tection of watermarks after noise addition, MPEG com pression, D/A conversion, pixel shifts appears feasible, but detection after tra nsformations, such as cropping and stretching, remains a challenge. We propose a model to evaluate the effect of scaling on the detector reliability and verify it with experiments.


SPEC-3.5  

PDF File of Paper Manuscript
Data Embedding in Audio: Where Do We Stand
Ahmed H Tewfik, Mitchell D Swanson, Bin Zhu (University of Minnesota)

Data embedding algorithms embed binary streams in host multimedia signals. The embedded data can add features to the host multimedia signal or provide copyright protection. We review requirements for transparent data embedding techniques in audio signals. We describe and contrast current approaches to data embedding in audio. In particular, we emphasize the advantages and limitations of the various approaches. we also describe possible signal processing and protocol level attacks on audio watermarking algorithms. We conclude with a discussion of future research directions.


SPEC-3.6  

PDF File of Paper Manuscript
The Business Case for Audio Watermarking
Paul Jessop (Intl. Federation of the Phonographic Industry)

This presentation will review the applications of audio watermarking for the recording industry. It will examine the reasons for placing watermarks in sound recordings, the benefits which might result and the potential hazards which need to be overcome. It will cover the objectives, methodology and results of the MUSE project, one of whose tasks was the evaluation of ``embedded signaling'' systems. Finally, it will look at recent developments in the adoption of watermarking in the recording industry.


SPEC-2 SPEC-4 >


Last Update:  February 4, 1999         Ingo Höntsch
Return to Top of Page