Beruflich Dokumente
Kultur Dokumente
Mr. Pirate
Robustness:
Watermark has to be robust to signal manipulation.
Impossible to remove without significant alteration of the signal.
Statistically undetectable by others to prevent the efforts of unauthorized
removal.
Can be fulfilled if the potential number of keys that produce distinct
watermarks is large.
Detection scheme should be as statistically reliable as possible.
False rejection or acceptance of watermark should be minimal.
Audio Watermarking: A Temporal Method, p.1
S is defined as follows
N
S y (i ) w(i )
i 1
Audio Watermarking: A Temporal Method, p.3
w
S S
r N
N
f ( y(i), w(i))w(i)
i 1
Private Key
Real Original Watermark Watermarked
Embedded
Supplied by author
Video Watermarking: A Method, p.1
Spatial
Masking
Author signature
+
Watermark block
Video Watermarking: A Method, p.2
Detection of Watermark
With knowledge of location in video sequence
X = input, R = received coeffs, F = original coeffs, N = noise, W = watermark
P. Bassia and I. Pitas, Robust Audio Watermarking in the Time Domain. Dept. of
Informatics, University of Thessaloniki.
Jian Zhao, Look, Its Not There. BYTE Magazine - January 1997.
M. Swanson, B. Zhu, and A. Twefik, Multiresolution Scene-Based Video
Watermarking Using Perceptual Models. IEEE Journal on Selected Areas in
Communications, IEEE 1998.
Answer to Questions, p.1
The key is a unique code for an authors identification. This unique code is used to
generate a maximum length Pseudo-random Noise sequence. This PN sequence is then used
to generate the watermark signal w(i) as show in the diagram above. Thus the key is really
utilized by the function w(i).
A masking threshold for the audio signal can be generated using MPEG Audio
Psychoacoustic Model 1. The PN sequence generated by the key is then filtered with the
masking filter M(w) to ensure that the spectrum of the watermark is below the masking
threshold. This ensures that the watermark is inaudible after embedding into the signal.
Answer to Questions, p.2