Watermark Detection and Extraction Using Independent Component Analysis Method

This paper proposes a new image watermarking technique, which adopts Independent Component Analysis (ICA) for watermark detection and extraction process (i.e., dewatermarking). Watermark embedding is performed in the spatial domain of the original image. Watermark can be successfully detected during the Principle Component Analysis (PCA) whitening stage. A nonlinear robust batch ICA algorithm, which is able to efficiently extract various temporally correlated sources from their observed linear mixtures, is used for blind watermark extraction. The evaluations illustrate the validity and good performance of the proposed watermark detection and extraction scheme based on ICA. The accuracy of watermark extraction depends on the statistical independence between the original, key and watermark images and the temporal correlation of these sources. Experimental results demonstrate that the proposed system is robust to several important image processing attacks, including some geometrical transformations—scaling, cropping and rotation, quantization, additive noise, low pass filtering, multiple marks, and collusion.

[1]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[2]  Aapo Hyvärinen,et al.  Survey on Independent Component Analysis , 1999 .

[3]  Bruno O. Shubert,et al.  Random variables and stochastic processes , 1979 .

[4]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[5]  Ross J. Anderson,et al.  Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[6]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[7]  Chris Chatfield,et al.  Introduction to Statistical Time Series. , 1976 .

[8]  Göran Salomonsson,et al.  Image enhancement based on a nonlinear multiscale method , 1997, IEEE Trans. Image Process..

[9]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[10]  H. Saunders,et al.  Probability, Random Variables and Stochastic Processes (2nd Edition) , 1989 .

[11]  Allan Kardec Barros,et al.  Robust batch algorithm for sequential blind extraction of noisy biomedical signals , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[12]  T. Ens,et al.  Blind signal separation : statistical principles , 1998 .

[13]  R. L. Kashyap,et al.  Robust Image Models and Their Applications , 1988 .

[14]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[15]  Aapo Hyvärinen,et al.  Independent Component Analysis: A Tutorial , 1999 .

[16]  Erkki Oja,et al.  A class of neural networks for independent component analysis , 1997, IEEE Trans. Neural Networks.

[17]  L. Marton,et al.  Advances in Electronics and Electron Physics , 1958 .

[18]  Te-Won Lee,et al.  Independent Component Analysis , 1998, Springer US.

[19]  I. Miller Probability, Random Variables, and Stochastic Processes , 1966 .

[20]  Terrence J. Sejnowski,et al.  Blind source separation of more sources than mixtures using overcomplete representations , 1999, IEEE Signal Processing Letters.

[21]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[22]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[23]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .