The
1
N
entropic power was also estimated on the
o
n original coefficient vector. The bandwidth W
was computed as half the frame rate.
When considering the capacity value in eq. (A8),
the model provided by the present study (
i.e. the pdf
in Table 1) is considered as the noise
pdf )(np
N
.
The
)(xp
X
function giving the capacity value is
searched for by means of a numerical strategy.
Actually, it is considered that
)(xp
X
itself can be
represented as a mixture of 5 Gaussian laws, thus
restricting the searching to a space with 15
dimensions (5 weights, 5 means values and 5
variances). These 15 dimensions are not
independent. First, the sum of weights should
equal 1. Secondly, the mean of the mark (
i.e. the
mixture mean) is set to 0 (a generally accepted
assumption in watermarking). Thirdly, the mixture
variance was set so as to ensure a good transparency
(
i.e. 30dB lower than the host video).
The capacity values computed with the general
formula and with Shannon limits are shown in
Table 3. A general agreement between the two types
of capacity estimation can e noticed, with some
exceptions (for
1=
of Gaussian filtering, StirMark).
At the same time, the capacity estimation starting
from the attack models is compulsory when a certain
degree of precision is required: that capacity
evaluation by limits can lead at relative errors of
about 100% and larger!
Table 3: Capacity value and limits (lower and upper ) for
rank
r = 1, r = 150 and r=300.
Rank
Attack
Capacity
Gaussian
filtering
Sharpening StirMark
value 3.567 1.332 2.307
r = 1
limits
(3.632 ;
3.651)
(1.268 ;
1.725)
(2.394 ;
2.415)
value 0.339 0.251 0.259
r =
150
limits
(0.037 ;
0.949)
(0.004 ;
0.569)
(0.005 ;
0.273)
value 0.055 0.006 0.009
r =
300
limits
(0.018 ;
0.935)
(0.002 ;
0.621)
(0.002 ;
0.273)
5 CONCLUSIONS
The present paper brings into evidence that some
real life watermarking attack effects are stationary in
the DCT hierarchy and accurately estimates the
corresponding probability density functions. Then,
these models are involved in capacity evaluation.
From the applicative point of view, beyond
watermarking itself (
i.e. reaching the capacity limit
in a practical application), these results are the
starting point for a large variety of applications in
the multimedia content processing, as smart
indexing or in-band content enrichment, for
instance.
Further work will be also devoted to considering
the Blahut approach for watermarking capacity
evaluation.
ACKNOWLEDGEMENTS
This work is partially supported by the HD3D-IIO
project of the Cap Digital competitiveness cluster.
REFERENCES
Archambeau, C., Lee, J., Verleysen, M., 2003.
Convergence Problems of the EM Algorithm for
Finite Gaussian Mixtures, Proc. 11th European
Symposium on Artificial Neural Networks
, Bruges,
Belgium, pp. 99-106.
Archambeau, C., Verleysen, M., 2003. Fully
Nonparametric Probability Density Function
Estimation with Finite Gaussian Mixture Models,
Proc. ICAPR, Calcutta, India, pp. 81-84.
Archambeau, C., Valle, M., Assenza, A., Verleysen, M.,
2006. Assessment of Probability Density Estimation
Methods: Parzen Window and Finite Gaussian
Mixtures,
Proc. IEEE International Symposium on
Circuits and Systems
, Kos, Greece.
Basseville, M., 1996. Information: entropies, divergences
et moyennes,
Internal report–INRIA, N°1020.
Costa, M., 1983. Writing on dirty paper,
IEEE
Transactions on Information Theory
, Vol. IT-29, pp.
439-441.
Cox, I., Miller, M., Bloom, J., 2002.
Digital
Watermarking
, Morgan Kaufmann Publishers.
Dempster, A.P., Laird, N.M., Rubin, D.B., 1977.
Maximum Likelihood from Incomplete Data via the
EM Algorithm,
Journal of the Royal Statistical
Society, Series B
, Vol. 39, No. 1, pp. 1-38.
Dumitru, O., Duta, S., Mitrea, M., Prêteux, F., 2007.
Gaussian Hypothesis for Video Watermarking
Attacks: Drawbacks and Limitations,
EUROCON
2007
, Warsaw, Poland, pp. 849-855.
Dumitru, O., Mitrea, M., Preteux, F., 2007. Accurate
Watermarking Capacity Evaluation, Proc. SPIE, Vol.
6763, pp. 676303:1-12.
Mitrea, M., Prêteux, F., Petrescu, M., 2006. Very Low
Bitrate Video: A Statistical Analysis in the DCT
Domain, LNCS, Vol. 3893, pp. 99-106.
DCT DOMAIN VIDEO WATERMARKING - Attack Estimation and Capacity Evaluation
243