Channel Capacity Analysis of Spread Spectrum Watermarking in Radio Frequency Signals

The carrier of the digital watermark expands from audio signals to radio frequency (RF) signals. Unlike audio signals, RF signals, such as the watermark transmission carrier, must be correctly demodulated with the watermark signals so that the distortion of the digital carrier embedded with the watermark is associated with the change in bit error rate. Based on the spread spectrum watermarking scheme, the distortion of the digital carrier signal is redefined, and the channel capacity expression of the watermarking scheme is derived. In addition, the optimal parameters to achieve the maximal channel capacity are discussed, and the constraint relation between the channel capacity and the allowable distortion is investigated.

[1]  Xiang Li,et al.  Physical Layer Watermarking of Direct Sequence Spread Spectrum Signals , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[2]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[3]  Yuhong Yang Elements of Information Theory (2nd ed.). Thomas M. Cover and Joy A. Thomas , 2008 .

[4]  Darko Kirovski,et al.  Robust spread-spectrum audio watermarking , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[5]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[6]  A.Z. Tirkel,et al.  Image watermarking-a spread spectrum application , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.

[7]  Kaigui Bian,et al.  Blind Transmitter Authentication for Spectrum Security and Enforcement , 2014, CCS.

[8]  Jae Young Lee,et al.  Transmitter Identification Signal Analyzer for Single Frequency Network , 2008, IEEE Transactions on Broadcasting.

[9]  John E. Kleider,et al.  Radio frequency watermarking for OFDM wireless networks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[10]  Xianbin Wang,et al.  Transmitter identification using embedded pseudo random sequences , 2004, IEEE Transactions on Broadcasting.

[11]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[12]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[13]  Mani Mina,et al.  Physical-Layer Identification of Wired Ethernet Devices , 2012, IEEE Transactions on Information Forensics and Security.

[14]  Kaigui Bian,et al.  PHY-layer authentication by introducing controlled inter symbol interference , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[15]  Joshua R. Smith,et al.  ID Modulation: Embedding Sensor Data in an RFID Timeseries , 2005, Information Hiding.

[16]  Ying Zhang,et al.  Channel Capacity Analysis of the Generalized Spread Spectrum Watermarking in Audio Signals , 2015, IEEE Signal Processing Letters.

[17]  Benxiong Huang,et al.  Channel Capacity Analysis of the Multiple Orthogonal Sequence Spread Spectrum Watermarking in Audio Signals , 2016, IEEE Signal Processing Letters.

[18]  Ingemar J. Cox,et al.  The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..

[19]  Miodrag Potkonjak,et al.  Real-time watermarking techniques for sensor networks , 2003, IS&T/SPIE Electronic Imaging.

[20]  Zhen Yang,et al.  Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission , 2016, IEEE Transactions on Wireless Communications.

[21]  Brian M. Sadler,et al.  Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.

[22]  Kaigui Bian,et al.  PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement , 2016, IEEE Transactions on Information Forensics and Security.

[23]  Sung Ik Park,et al.  RF Watermark Backward Compatibility Tests for the ATSC Terrestrial DTV Receivers , 2011, IEEE Transactions on Broadcasting.

[24]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.