Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources

An information-theoretic approach is proposed to watermark embedding and detection under limited detector resources. First, the attack-free scenario is considered under which asymptotically optimal decision regions in the Neyman-Pearson sense are proposed, along with the optimal embedding rule. Later, the case of zero-mean independent and identically distributed (i.i.d.) Gaussian covertext distribution is explored with unknown variance under the attack-free scenario. For this case, a lower bound on the exponential decay rate of the false-negative probability is proposed. It is proven that the optimal embedding and detecting strategy is superior to the customary linear, additive embedding strategy in the exponential sense. Finally, these results are extended to the case of memoryless attacks and general worst case attacks. Optimal decision regions and embedding rules are offered, and the worst attack channel is identified.

[1]  Shlomo Shamai,et al.  On information rates for mismatched decoders , 1994, IEEE Trans. Inf. Theory.

[2]  Pierre Moulin,et al.  Error exponents for watermarking game with squared-error constraints , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..

[3]  Mauro Barni,et al.  Effectiveness of exhaustive search and template matching against watermark desynchronization , 2005, IEEE Signal Processing Letters.

[4]  Neri Merhav,et al.  On the estimation of the order of a Markov chain and universal data compression , 1989, IEEE Trans. Inf. Theory.

[5]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[6]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[7]  Neri Merhav,et al.  Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Trans. Inf. Theory.

[8]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[9]  Teddy Furon,et al.  A Constructive and Unifying Framework for Zero-Bit Watermarking , 2006, IEEE Transactions on Information Forensics and Security.

[10]  A. D. Wyner A Bound on the Number of Distinguishable Functions which are Time-Limited and Approximately Band-Limited , 1973 .

[11]  Jean-Paul M. G. Linnartz,et al.  Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.

[12]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[13]  Ingemar J. Cox,et al.  Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[14]  Michael Gutman,et al.  Asymptotically optimal classification for multiple tests with empirically observed statistics , 1989, IEEE Trans. Inf. Theory.

[15]  Neri Merhav Universal detection of messages via finite-state channels , 2000, IEEE Trans. Inf. Theory.

[16]  Neri Merhav,et al.  Optimal Watermark Embedding and Detection Strategies Under General Worst Case Attacks , 2007, 2007 IEEE International Symposium on Information Theory.

[17]  Edward J. Delp,et al.  Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..

[18]  Jeffrey A. Bloom,et al.  Computing the Probability of False Watermark Detection , 1999, Information Hiding.

[19]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[20]  Neri Merhav,et al.  The estimation of the model order in exponential families , 1989, IEEE Trans. Inf. Theory.

[21]  Neri Merhav,et al.  An Information – Theoretic View of Watermark Embedding – Detection and Geometric Attacks , 2005 .

[22]  Neri Merhav,et al.  Estimating the number of states of a finite-state source , 1992, IEEE Trans. Inf. Theory.

[23]  N. D. Bruijn Asymptotic methods in analysis , 1958 .

[24]  Juan R. Hern,et al.  Statistical Analysis of Watermarking Schemes for Copyright Protection of Images , 1999 .

[25]  Pierre Moulin,et al.  Error exponents for one-bit watermarking , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[26]  Neri Merhav Universal decoding for memoryless Gaussian channels with a deterministic interference , 1993, IEEE Trans. Inf. Theory.

[27]  A. Gualtierotti H. L. Van Trees, Detection, Estimation, and Modulation Theory, , 1976 .

[28]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[29]  H. V. Trees Detection, Estimation, And Modulation Theory , 2001 .

[30]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.

[31]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[32]  Neri Merhav,et al.  On the capacity game of public watermarking systems , 2004, IEEE Transactions on Information Theory.

[33]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[34]  S. Orszag,et al.  Advanced Mathematical Methods For Scientists And Engineers , 1979 .

[35]  Neri Merhav,et al.  On the error exponent and capacity games of private watermarking systems , 2003, IEEE Trans. Inf. Theory.