Detection and robustness of digital image watermarking signals: a communication theory approach

DETECTION AND ROBUSTNESS OF DIGITAL IMAGE WATERMARKING SIGNALS: A COMMUNICATION THEORY APPROACH by George F. Elmasry The detection and robustness of the watermark signal is studied from a communications point of view. The contributions of this dissertation are presented in two parts. The first part, which covers the detection aspect, introduces a new digital image watermarking approach that embeds meaningful information in a copyright protection watermark signal; demonstrates the need to approach the watermark signal as a power-constrained signal; studies the relationship between the watermark signal dimension and the image capacity to the signal; explains the similarities and differences between detecting the watermark signal and detecting a signal over a spread-spectrum communication channel; and analyzes the application of sequence detection techniques (MAPSD and MLSD) to the watermark signal. The second part, which covers the robustness aspect, introduces a novel multidimensional interleaving algorithm that increases the signal's robustness against burst errors; presents, analyzes, and compares two techniques for implementing the algorithm (a sliding window technique and a successive partitioning technique); and demonstrates the increase in watermark signal robustness as a result of applying this multidimensional interleaving. This increase of the signal's robustness is shown in the 2-D case by applying the 2-D version of the interleaving algorithm to watermark signals embedded in still images (where the signal layout is in 2-D), and in the 3-D case by applying the 3-D version of the interleaving algorithm to watermark signals embedded in video sequences (where the signal layout is in 3-D). DETECTION AND ROBUSTNESS OF DIGITAL IMAGE WATERMARKING SIGNALS: A COMMUNICATION THEORY APPROACH by George F. Elmasry A Dissertation Submitted to the Faculty of New Jersey Institute of Technology in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Department of Electrical and Computer Engineering

[1]  Fernando Pérez-González,et al.  Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images , 1998, IEEE J. Sel. Areas Commun..

[2]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[3]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[4]  Yun Q. Shi,et al.  MAP symbol decoding of arithmetic coding with embedded channel coding , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).

[5]  Frank Bossen,et al.  Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.

[6]  Jorge Herbert de Lira,et al.  Two-Dimensional Signal and Image Processing , 1989 .

[7]  S. Leigh,et al.  Probability and Random Processes for Electrical Engineering , 1989 .

[8]  Andrew B. Watson,et al.  DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.

[9]  G.F. Elmasry,et al.  Power constrained multiple signaling in digital image watermarking , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[10]  S. Wicker Error Control Systems for Digital Communication and Storage , 1994 .

[11]  Richard E. Blahut,et al.  Principles and practice of information theory , 1987 .

[12]  Shu Lin,et al.  Error control coding : fundamentals and applications , 1983 .

[13]  Yun Q. Shi,et al.  Maximum-likelihood sequence decoding of digital image watermarking , 1999, Electronic Imaging.

[14]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[15]  Rafael C. González,et al.  Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[16]  Jerome Swartz,et al.  Information encoding with two-dimensional bar codes , 1992, Computer.

[17]  R. McEliece,et al.  Reed-Solomon Codes and the Exploration of the Solar System , 1994 .

[18]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[19]  Jiwu Huang,et al.  Adaptive image watermarking scheme based on visual masking , 1998 .

[20]  I. M. Jacobs,et al.  Principles of Communications Engineering , 1966 .

[21]  Stephen G. Wilson,et al.  Digital Modulation and Coding , 1995 .

[22]  A. Popplewell,et al.  Simple technique for constructing 2-dimensional maximum-run-length-limited error-control codes , 1992 .

[23]  Stephen B. Wicker,et al.  Reed-Solomon Codes and Their Applications , 1999 .

[24]  Masoud Salehi,et al.  Communication Systems Engineering , 1994 .

[25]  Ahmed H. Tewfik,et al.  Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..