An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain

Achieving robustness, imperceptibility and high capacity simultaneously is of great importance in digital watermarking. This paper presents a new informed image watermarking scheme with high robustness and simplified complexity at an information rate of 1/64 bit/pixel. Firstly, a Taylor series approximated locally optimum test (TLOT) detector based on the hidden Markov model (HMM) in the wavelet domain is developed to tackle the problem of unavailability of exact embedding strength in the receiver due to informed embedding. Then based on the TLOT detector and the concept of dirty-paper code design, new HMM-based spherical codes are constructed to provide an effective tradeoff between robustness and distortion. The process of informed embedding is formulated as an optimization problem under the robustness and distortion constraints and the genetic algorithm (GA) is then employed to solve this problem. Moreover, the perceptual distance in the wavelet domain is also developed and incorporated into the GA-based optimization. Simulation results demonstrate that the proposed informed watermarking algorithm has high robustness against common attacks in signal processing and shows a comparable performance to the state-of-the-art scheme with a greatly reduced arithmetic complexity.

[1]  Sung-Jea Ko,et al.  Content-Adaptive Robust Image Watermarking with Posterior HMM-Based Detector , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[2]  Jiwu Huang,et al.  A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain , 2005, IWDW.

[3]  Andrew B. Watson,et al.  DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.

[4]  Harry L. Van Trees,et al.  Detection, Estimation, and Modulation Theory, Part I , 1968 .

[5]  M. Barni,et al.  Informed watermarking by means of orthogonal and pseudo-random dirty paper coding , 2005 .

[6]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[7]  Francesco G. B. De Natale,et al.  Watermarking Robustness Evaluation Based on Perceptual Quality via Genetic Algorithms , 2009, IEEE Transactions on Information Forensics and Security.

[8]  Mitsuo Gen,et al.  Genetic algorithms and engineering design , 1997 .

[9]  Allen Van Gelder,et al.  Computer Algorithms: Introduction to Design and Analysis , 1978 .

[10]  Jie Chen,et al.  Scalar quantization noise analysis and optimal bit allocation for a wavelet pyramid image coding system , 1992, [Proceedings] Singapore ICCS/ISITA `92.

[11]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[12]  P. Kumsawat,et al.  A new approach for optimization in image watermarking by using genetic algorithms , 2005, IEEE Transactions on Signal Processing.

[13]  John D. Villasenor,et al.  Visibility of wavelet quantization noise , 1997, IEEE Transactions on Image Processing.

[14]  G. Wornell,et al.  Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[15]  T. Cover,et al.  Writing on colored paper , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).

[16]  Mauro Barni,et al.  Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding , 2005, IEEE Transactions on Signal Processing.

[17]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[18]  Pierre Moulin,et al.  The role of information theory in watermarking and its application to image watermarking , 2001, Signal Process..

[19]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[20]  Robert D. Nowak,et al.  Wavelet-based statistical signal processing using hidden Markov models , 1998, IEEE Trans. Signal Process..

[21]  Ingemar J. Cox,et al.  Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.

[22]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[23]  Adrian S. Lewis,et al.  Image compression using the 2-D wavelet transform , 1992, IEEE Trans. Image Process..

[24]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[25]  Uri Erez,et al.  Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding , 2004, IEEE Transactions on Information Theory.

[26]  B. Girod,et al.  A blind watermarking scheme based on structured codebooks , 2000 .

[27]  Bernd Girod,et al.  Estimation of amplitude modifications before SCS watermark detection , 2002, IS&T/SPIE Electronic Imaging.

[28]  W. Fischer,et al.  Sphere Packings, Lattices and Groups , 1990 .

[29]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.

[30]  Ying Wang,et al.  Capacity and Random-Coding Exponents for Channel Coding With Side Information , 2007, IEEE Transactions on Information Theory.

[31]  Thierry Pun,et al.  Optimal adaptive diversity watermarking with channel state estimation , 2001, IS&T/SPIE Electronic Imaging.

[32]  C. Mosquera,et al.  Rational dither modulation: a high-rate data-hiding method invariant to gain attacks , 2005, IEEE Transactions on Signal Processing.

[33]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.