Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Study of finite word-length effect on the performance of watermarking methods

Published: 01 April 2015 Publication History

Abstract

This present paper represents a simple framework for the novel study of the effect of finite word-length FWL on the performance of different watermarking methods in the computer environment. We have evaluated the performance of discrete wavelet transform DWT and singular value decomposition SVD-based watermarking methods at different word-lengths and found a reliable word-length the word-length up to which change in the performance is significant and beyond this, is unnoticeable for each watermarking method. The reliable word-length can be used as a new benchmark for comparing different watermarking methods for their real-time implementation, where optimisation with respect to memory, implementation area, performance, and power consumption are the foremost demand.

References

[1]
Agarwal, H., Atrey, P.K. and Raman, B. (2014) 'Image watermarking in real oriented wavelet transform domain', Multimedia Tools and Applications, pp.1-39.
[2]
Alattar, O.M. and Alattar, A.M. (2005) 'A fast hierarchical watermark detector for real-time software or low-cost hardware implementation', Image Processing, 2005: ICIP 2005, IEEE International Conference on, Vol. 1, pp.1-973, IEEE.
[3]
Ali, M. and Ahn, C.W. (2014) 'An optimized watermarking technique based on self-adaptive de in DWT-SVD transform domain', Signal Processing, Vol. 94, pp.545-556.
[4]
Bender, W., Butera, W., Gruhl, D., Hwang, R., Paiz, F.J. and Pogreb, S. (2000) 'Applications for data hiding', IBM Systems Journal, Vol. 39, Nos. 3/4, pp.547-568.
[5]
Bhatnagar, G. and Raman, B. (2009) 'A new robust reference watermarking scheme based on DWT-SVD', Computer Standards & Interfaces, Vol. 31, No. 5, pp.1002-1013.
[6]
Bhatnagar, G., Wu, Q.J. and Raman, B (2013) 'A new aspect in robust digital watermarking', Multimedia Tools and Applications, Vol. 66, No. 2, pp.179-200.
[7]
Brunton, A. and Zhao, J. (2005) 'Real-time video watermarking on programmable graphics hardware', Electrical and Computer Engineering, 2005: Canadian Conference on, pp.1312-1315, IEEE.
[8]
Constantinides, G.A., Cheung, P.Y. and Luk, W. (2003) 'Word length optimization for linear digital signal processing', Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on, Vol. 22, No. 10, pp.1432-1442.
[9]
Cox, I.J. and Miller, M.L. (2001) 'Electronic watermarking: the first 50 years', Multimedia Signal Processing, 2001 IEEE Fourth Workshop on, pp.225-230, IEEE.
[10]
Fallahpour, M. and Megías, D. (2011) 'High capacity audio watermarking using the high frequency band of the wavelet domain', Multimedia Tools and Applications, Vol. 52, Nos. 2-3, pp.485-498, Springer.
[11]
Faragallah, O.S. (2013) 'Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain', AEU-International Journal of Electronics and Communications, Vol. 67, No. 3, pp.189-196.
[12]
Hassanien, A.E. (2006) 'Hiding iris data for authentication of digital images using wavelet theory', Pattern Recognition and Image Analysis, Vol. 16, No. 4, pp.637-643.
[13]
Hilaire, T., Chevrel, P. and Whidborne, J.F. (2007) 'A unifying framework for finite word length realizations', Circuits and Systems I: Regular Papers, IEEE Transactions on, Vol. 54, No. 8, pp.1765-1774.
[14]
Joshi, A., Darji, A. and Mishra, V. (2011) 'Design and implementation of real-time image watermarking', Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on, pp.1-5, IEEE.
[15]
Knowles, J. and Edwards, R. (1965) 'Effect of a finite-word-length computer in a sampled-data feedback system', Electrical Engineers, Proceedings of the Institution of, Vol. 112, No. 6, pp.1197-1207.
[16]
Kodek, D. (1980) 'Design of optimal finite word length FIR digital filters using integer programming techniques', Acoustics, Speech and Signal Processing, IEEE Transactions on, Vol. 28, No. 3, pp.304-308.
[17]
Kougianos, E., Mohanty, S.P. and Mahapatra, R.N. (2009) 'Hardware assisted watermarking for multimedia', Computers & Electrical Engineering, Vol. 35, No. 2, pp.339-358.
[18]
Kundur, D. and Hatzinakos, D. (1999) 'Digital watermarking for telltale tamper proofing and authentication', Proceedings of IEEE, Vol. 87, No. 7, pp.1167-1179.
[19]
Lai, C.C. (2011) 'A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm', Digital Signal Processing, Vol. 21, No. 4, pp.522-527.
[20]
Liu, B. (1971) 'Effect of finite word length on the accuracy of digital filters - a review', Circuit Theory, IEEE Transactions on, Vol. 18, No. 6, pp.670-677.
[21]
Mathai, N.J., Kundur, D. and Sheikholeslami, A. (2003) 'Hardware implementation perspectives of digital video watermarking algorithms', Signal Processing, IEEE Transactions on, Vol. 51, No. 4, pp.925-938.
[22]
Memon, N. and Wong, P.W. (1998) 'Protecting digital media content', Communications of the ACM, Vol. 41, No. 7, pp.35-43.
[23]
Middleton, R. and Goodwin, G. (1986) 'Improved finite word length characteristics in digital control using delta operators', Automatic Control, IEEE Transactions on, Vol. 31, No. 11, pp.1015-1021.
[24]
Mintzer, F., Braudaway, G.W. and Yeung, M.M. (1997) 'Effective and ineffective digital watermarks', Image Processing, 1997: Proceedings, International Conference on, Vol. 3, pp.9-12, IEEE.
[25]
Mitra, S. (2010) 'Dynamic route optimisation in a multihomed mobile network', International Journal of Computational Vision and Robotics, Vol. 1, No. 2, pp.121-135.
[26]
Mohammad, A.A., Alhaj, A. and Shaltaf, S. (2008) 'An improved SVD-based watermarking scheme for protecting rightful ownership', Signal Processing, Vol. 88, No. 9, pp.2158-2180.
[27]
Mohanty, S.P., Pati, N. and Kougianos, E. (2007) 'A watermarking co-processor for new generation graphics processing units', Consumer Electronics, 2007, ICCE 2007: Digest of Technical Papers, International Conference on, pp.1-2, IEEE.
[28]
Oppenheim, A.V. and Weinstein, C.J. (1972) 'Effects of finite register length in digital filtering and the fast Fourier transform', Proceedings of the IEEE, Vol. 60, No. 8, pp.957-976.
[29]
Podilchuk, C.I. and Delp, E.J. (2001) 'Digital watermarking: algorithms and applications', Signal Processing Magazine, Vol. 18, No. 4, pp.33-46, IEEE.
[30]
Rani, A., Raman, B. and Kumar, S. (2014) 'A robust watermarking scheme exploiting balanced neural tree for rightful ownership protection', Multimedia Tools and Applications, Vol. 72, No. 3, pp.2225-2248.
[31]
Roy, S.D., Li, X., Shoshan, Y., Fish, A. and Yadid-Pecht, O. (2013) 'Hardware implementation of a digital watermarking system for video authentication', IEEE Transactions on Circuits and Systems for Video Technology, Vol. 23, No. 2, pp.289-301.
[32]
Shoshan, Y., Fish, A., Jullien, G.A. and Yadid-Pecht, O. (2008) 'Hardware implementation of a DCT watermark for CMOs image sensors', Electronics, Circuits and Systems, 2008, ICECS 2008: 15th IEEE International Conference on, IEEE, pp.368-371.
[33]
Soheili, M.R. (2008) 'Redundant watermarking using wavelet packets', IEEE/ACS International Conference on Computer Systems and Applications, 2008, AICCSA 2008, Doha, pp.591-598.
[34]
Subramanyam, A., Emmanuel, S. and Kankanhalli, M.S. (2012) 'Robust watermarking of compressed and encrypted jpeg2000 images', IEEE Transactions on Multimedia, Vol. 14, No. 3, pp.703-716.
[35]
Sung, W. and Kum, K.I. (1995) 'Simulation-based word-length optimization method for fixed-point digital signal processing systems', Signal Processing, IEEE Transactions on, Vol. 43, No. 12, pp.3087-3090.
[36]
Wang, N. and Men, C. (2013) 'Reversible fragile watermarking for locating tampered blocks in 2D vector maps', Multimedia Tools and Applications, Vol. 67, No. 3, pp.709-739.
[37]
Wolfgang, R.B., Podilchuk, C.I. and Delp, E.J. (1999) 'Perceptual watermarks for digital images and video', Proceedings of the IEEE, Vol. 87, No. 7, pp.1108-1126.
[38]
Yoo, K.S. and Lee, W.H. (2003) 'Wavelet-based blind watermarking technique for real-time watermark interpretation', Computational Science and Its Applications - ICCSA 2003, pp.348-355, Springer.
[39]
Zebbiche, K., Ghouti, L., Khelifi, F. and Bouridane, A. (2006) 'Protecting fingerprint data using watermarking', First NASA/ESA Conference on Adaptive Hardware and Systems, 2006, AHS 2006, Istanbul, pp.451-456.
[40]
Zhang, T., Wang, Z. and Parhi, K.K. (2001) 'On finite precision implementation of low density parity check codes decoder', Circuits and Systems, 2001: ISCAS 2001: The 2001 IEEE International Symposium on, Vol. 4, pp.202-205, IEEE.
[41]
Zhang, Y. and Tan, K.K. (2009) 'Text extraction from images captured via mobile and digital devices', International Journal of Computational Vision and Robotics, Vol. 1, No. 1, pp.34-58.
[42]
Zhao, J., Koch, E. and Luo, C. (1998) 'In business today and tomorrow', Communications of the ACM, Vol. 41, No. 7, pp.67-72.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Computational Vision and Robotics
International Journal of Computational Vision and Robotics  Volume 5, Issue 2
April 2015
118 pages
ISSN:1752-9131
EISSN:1752-914X
Issue’s Table of Contents

Publisher

Inderscience Publishers

Geneva 15, Switzerland

Publication History

Published: 01 April 2015

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media