<< Chapter < Page Chapter >> Page >

To analyze the robustness of our implementation of the Cox’s algorithm, a random generator function is used to generate a length-1000 string with printable characters (ACSII 32-126) for each trial of the analysis. A comparator is built to generate the ratio between number of correct character over the total number of characters by comparing the original watermark message to the extracted one. The ratio is recorded for the length-1000 randomly generated strings for each compression value starting at 512, the minimum value of the image’s dimensions. To visualize the result, the correct ratio is plotted against the compression values with a decrement of 5.

At very large and small compression values, correct ratios are unresponsive to the change of compression values. Between 450-100, the correct ratio drops linearly with compression. From this result, we can conclude that effectiveness of Cox’s DCT watermarking decays linearly with SVD compression at midrange and the algorithm is very effective for minor compression. Also note that error occurs for the characters with higher index before ones with lower. In context of sending secrete message through watermarking, errors are more likely to occur in longer messages than in a shorter ones under the same compression. In other words, if the message is short, one could send and retrieve the message with perfect accuracy even under high compression.

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Robustness analysis on dct watermarking technique under compression attack. OpenStax CNX. Dec 19, 2012 Download for free at http://cnx.org/content/col11472/1.1
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Robustness analysis on dct watermarking technique under compression attack' conversation and receive update notifications?

Ask