Title :
Hyperbolic RDM for Nonlinear Valumetric Distortions
Author :
Guccione, Pietro ; Scagliola, Michele
Author_Institution :
Dipt. di Elettrotec. ed Elettron., Politec. di Bari, Bari
fDate :
3/1/2009 12:00:00 AM
Abstract :
Quantization-based watermarking techniques are sensitive to valumetric scaling, a wide class of distortions applied to images and videos, such as contrast change or gamma correction. Several methods have been proposed to counteract valumetric attacks, but the common approach to the problem is to take only the linear ones into account. This paper presents an extension to the rational dither modulation (RDM) data-hiding scheme which provides robustness against nonlinear distortions modelled by a power-law attack. The algorithm makes use of proper mapping of the pixel values from the Cartesian to hyperbolic coordinates. This mapping is able to render the problem similar to the classical RDM scheme, since fixed multiplicative scaling is cancelled out while the exponentiation of a nonlinear distortion is transformed into a gain scaling. The validity of the approach has been confirmed by applying the watermarking scheme to Gaussian host and real images; experimental results confirm its intrinsic invariance against the power-law attack. Finally, it will be shown that under the white Gaussian noise addition, the proposed scheme achieves a good bit-error rate (BER). The measured BER is affected by the properties of the embedding domain, as supported by the theoretical analysis given in this paper.
Keywords :
Gaussian processes; data encapsulation; error statistics; nonlinear distortion; watermarking; BER; Cartesian coordinates; Gaussian host; Gaussian noise addition; bit-error rate; hyperbolic coordinates; nonlinear distortions; nonlinear valumetric distortions; power-law attack; quantization-based watermarking techniques; rational dither modulation data-hiding scheme; valumetric attacks; valumetric scaling; Nonadditive watermarking channel; rational dither modulation (RDM); watermarking;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2008.2011080