Robustness analysis of patchwork watermarking schemes

The patchwork watermarking scheme is investigated in this chapter. The performance of this algorithm in terms of imperceptibility, robustness and security has been shown to be satisfactory. Robustness of the patchwork algorithm to the curve-fitting attack and blind multipleembedding attack is presented also in this chapter. Robustness against jitter attack which is a natural enemy of this watermarking algorithm is also studied. Index Terms Patchwork Watermarking, Robustness, Curve-fitting, Jitter, Multiple-embedding.

[1]  Michael Arnold Audio watermarking: features, applications and algorithms , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[2]  Thierry Pun,et al.  Second Generation Benchmarking and Application Oriented Evaluation , 2001, Information Hiding.

[3]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[4]  Alan Wee-Chung Liew,et al.  Visual Speech Recognition: Lip Segmentation and Mapping , 2008 .

[5]  Cormac Herley Why watermarking is nonsense , 2002, IEEE Signal Process. Mag..

[6]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[7]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[8]  Robert C. Spicer,et al.  Author's biography , 1993 .

[9]  Hyoung Joong Kim,et al.  Modified Patchwork Algorithm: a novel audio watermarking scheme , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[10]  N. Cvejic,et al.  Increasing robustness of patchwork audio watermarking algorithm using attack characterization , 2004, IEEE International Symposium on Consumer Electronics, 2004.

[11]  Hyoung Joong Kim,et al.  Security Evaluation of Generalized Patchwork Algorithm from Cryptanalytic Viewpoint , 2005, KES.

[12]  Dan Boneh,et al.  Cryptographic methods in multimedia identification and authentication , 2006 .

[13]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[14]  Yulin Wang Estimation-based patchwork image watermarking technique , 2003, J. Digit. Inf. Manag..

[15]  Teddy Furon,et al.  Watermarking security part one: Theory , 2005, IS&T/SPIE Electronic Imaging.

[16]  Hyoung Joong Kim,et al.  Generalized patchwork algorithm for image watermarking , 2003, Multimedia Systems.

[17]  Pierre Moulin Comments on "Why watermarking is nonsense" , 2003 .

[18]  A. Murat Tekalp,et al.  Multimodal Speaker Identification Using Discriminative Lip Motion Features , 2009 .

[19]  Ramiro Jordan,et al.  Geometric attacks on image watermarking systems , 2005, IEEE MultiMedia.

[20]  Subhamoy Maitra,et al.  Cryptanalysis of correlation-based watermarking schemes using single watermarked copy , 2004, IEEE Signal Processing Letters.

[21]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[22]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.

[23]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[24]  Jiwu Huang,et al.  Efficiently self-synchronized audio watermarking for assured audio data transmission , 2005, IEEE Transactions on Broadcasting.

[25]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[26]  N. Cvejic,et al.  Robust audio watermarking in wavelet domain using frequency hopping and patchwork method , 2003, 3rd International Symposium on Image and Signal Processing and Analysis, 2003. ISPA 2003. Proceedings of the.

[27]  Chang Dong Yoo,et al.  Image watermarking based on invariant regions of scale-space representation , 2006, IEEE Transactions on Signal Processing.

[28]  Fernando Pérez-González,et al.  Information-Theoretic Analysis of Security in Side-Informed Data Hiding , 2005, Information Hiding.

[29]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[30]  Xiangyang Xue,et al.  Content Based Localized Robust Audio Watermarking , 2003, MIPS.

[31]  Rui Yang,et al.  Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain , 2006, Information Hiding.

[32]  Ahmed H. Tewfik,et al.  Robust audio watermarking using perceptual masking , 1998, Signal Process..

[33]  Min Wu,et al.  Rotation-, scale-, and translation-resilient public watermarking for images , 2000, Electronic Imaging.

[34]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.