Publication | Closed Access
<title>Fair benchmark for image watermarking systems</title>
510
Citations
34
References
1999
Year
EngineeringBiometricsInformation ForensicsImage ForensicsImage AnalysisData SciencePattern RecognitionBenchmark StudyComputational ImagingSame Robustness CriteriaVideo QualityComputer ScienceContext WatermarkingImage DegradationImage Quality AssessmentComputer VisionDigital WatermarkingMultimedia SecurityFair Benchmark
Since the early 1990s, numerous robust watermarking papers have appeared, yet none share common robustness criteria, making comparison impractical and hindering progress. The authors propose an evaluation procedure that enables fair comparison of image watermarking systems. They identify essential benchmarking parameters, critique standard image‑quality metrics, introduce a human‑visual‑system‑adapted metric, and develop graph‑based tools—including attack‑vs‑visual‑quality, bit‑error‑vs‑visual‑quality, bit‑error‑vs‑attack, and ROC curves—to assess watermark performance. They review critical attacks that a practical system must withstand and establish a benchmark comprising a set of suitable images.
Since the early 90s a number of papers on 'robust' digital watermarking systems have been presented but none of them uses the same robustness criteria. This is not practical at all for comparison and slows down progress in this area. To address this issue, we present an evaluation procedure of image watermarking systems. First we identify all necessary parameters for proper benchmarking and investigate how to quantitatively describe the image degradation introduced by the watermarking process. For this, we show the weaknesses of usual image quality measures in the context watermarking and propose a novel measure adapted to the human visual system. Then we show how to efficiently evaluate the watermark performance in such a way that fair comparisons between different methods are possible. The usefulness of three graphs: 'attack vs. visual-quality,' 'bit-error vs. visual quality,' and 'bit-error vs. attack' are investigated. In addition the receiver operating characteristic (ROC) graphs are reviewed and proposed to describe statistical detection behavior of watermarking methods. Finally we review a number of attacks that any system should survive to be really useful and propose a benchmark and a set of different suitable images.
| Year | Citations | |
|---|---|---|
Page 1
Page 1