Robust copyright marking using Weibull distribution

For multimedia document, watermarking provides many advantages; however, its vulnerability due to attacks using signal processing methods offers challenge in designing robust techniques. This paper presents a novel method for enhancing robustness in copyright marking into mid-frequency discrete cosine transform (DCT) coefficients of an image. We establish that Weibull distribution suitably models mid-frequency coefficients well and use it for hiding copyright data. Our method is robust against JPEG compression attacks at both high and low compressions. Further, it is statistically undetectable in comparison to existing techniques of data hiding based on DCT coefficients. This is because it insignificantly affects the DCT coefficients of the stego image without compromising with data hiding capacity of the host image. Simulation result on Lena, Gibbon, Boat, and Peppers images illustrates that our algorithm offers lower bit error rate (BER) and higher peak signal to noise ratio (PSNR) leading to improved imperceptibility. Thus, it is useful in robust copyright marking.

[1]  Jerry D. Gibson,et al.  Distributions of the Two-Dimensional DCT Coefficients for Images , 1983, IEEE Trans. Commun..

[2]  Yong-Huai Huang,et al.  Hiding digital watermarks using multiresolution wavelet transform , 2001, IEEE Trans. Ind. Electron..

[3]  John Langford,et al.  Provably Secure Steganography , 2002, IEEE Transactions on Computers.

[4]  Motoi Iwata,et al.  A Digital Image Watermarking Scheme Withstanding Malicious Attacks , 2000 .

[5]  Yong Liang Guan,et al.  An objective comparison between spatial and DCT watermarking schemes for MPEG video , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[6]  Edward J. Delp,et al.  A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .

[7]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[8]  Ronitt Rubinfeld,et al.  Testing that distributions are close , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[9]  Xiangyang Wang,et al.  A robust digital audio watermarking based on statistics characteristics , 2009, Pattern Recognit..

[10]  K A Birney,et al.  On the modeling of DCT and subband image data for compression , 1995, IEEE Trans. Image Process..

[11]  Ning Liu,et al.  Statistically Secure Digital Image Data Hiding , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[12]  B. M. Hill,et al.  A Simple General Approach to Inference About the Tail of a Distribution , 1975 .

[13]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[14]  H. Singh,et al.  Parallelism for the faster implementation of the K-L transform for image compression , 1993, Pattern Recognit. Lett..

[15]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[16]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[17]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[18]  Mokshay M. Madiman,et al.  Generalized Entropy Power Inequalities and Monotonicity Properties of Information , 2006, IEEE Transactions on Information Theory.

[19]  Bülent Sankur,et al.  Robust Scaling-Based Image Watermarking Using Maximum-Likelihood Decoder With Optimum Strength Factor , 2009, IEEE Transactions on Multimedia.

[20]  Jue Wang,et al.  A region and data hiding based error concealment scheme for images , 2001, IEEE Trans. Consumer Electron..

[21]  Panagiotis Tsakalides,et al.  Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models , 2005, IEEE Transactions on Multimedia.

[22]  Bin Zhu,et al.  Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[23]  Meng Joo Er,et al.  Illumination compensation and normalization for robust face recognition using discrete cosine transform in logarithm domain , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[24]  Nariman Farvardin,et al.  Subband image coding using entropy-coded quantization over noisy channels , 1990, International Conference on Acoustics, Speech, and Signal Processing.

[25]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[26]  Frank Y. Shih,et al.  Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[27]  Daniel P. W. Ellis,et al.  Evaluation of Distance Measures Between Gaussian Mixture Models of MFCCs , 2007, ISMIR.

[28]  Bo Tao,et al.  Adaptive watermarking in the DCT domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.