Optimal look-up table-based data hiding

In this study, the authors present a novel data hiding scheme using the minimum distortion look-up table (LUT) embedding that achieves good distortion-robustness performance. LUT-based data hiding is a simple and efficient way to embed information into multimedia content for various applications, such as transaction tracking and database annotation. The authors find it possible to optimally reduce the data hiding-introduced distortion by designing the LUT according to the distribution of the host at a given robustness level. The authors first analyse the distortion introduced by LUT embedding and formulate its relationship with run constraints of LUT to construct an optimal coding problem. Subsequently, a Viterbi algorithm is presented to find the minimum distortion LUT. Then a new practical data hiding scheme using the optimal LUT is applied in the wavelet domain. Theoretical analysis and numerical results show that the new LUT design achieves not only less distortion but also more robustness than the traditional LUT-based data embedding schemes under common attacks such as Gaussian noise and JPEG compression.

[1]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[2]  Andrew J. Viterbi,et al.  Principles of Digital Communication and Coding , 1979 .

[3]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[4]  G.W. Wornell,et al.  An information-theoretic approach to the design of robust digital watermarking systems , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[5]  Deepa Kundur,et al.  A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.

[6]  Yu-Chih Huang,et al.  A Reversible Data Hiding Scheme Based on Block Division , 2008, 2008 Congress on Image and Signal Processing.

[7]  Justin K. Romberg,et al.  Bayesian tree-structured image modeling using wavelet-domain hidden Markov models , 2001, IEEE Trans. Image Process..

[8]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.

[9]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[10]  Min Wu Joint security and robustness enhancement for quantization based data embedding , 2003, IEEE Trans. Circuits Syst. Video Technol..

[11]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[12]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[13]  B. S. Manjunath,et al.  Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.

[14]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[15]  Min Wu,et al.  Multimedia Data Hiding , 2003, Springer New York.

[16]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[17]  Xiao-Ping Zhang,et al.  Multiscale Fragile Watermarking Based on the Gaussian Mixture Model , 2006, IEEE Transactions on Image Processing.

[18]  Wei Su,et al.  Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[19]  Lahouari Ghouti,et al.  Digital image watermarking using balanced multiwavelets , 2006, IEEE Transactions on Signal Processing.

[20]  Xiaofeng Wang,et al.  A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion , 2008, IEEE Transactions on Circuits and Systems for Video Technology.