On the hybrid multi-watermarking

Multi-watermarking is the technique to embed multiple messages into the same media content repeatedly. It can be used to identify media content's ownership or trace the illegal redistributors in media distribution. However, some performances of multiple watermark embedding, e.g., the distortion and security, are not considered carefully in the previous work. In this paper, the application scenario and framework of hybrid multi-watermarking are figured out, which show the secure media distribution model suitable for hierarchical media distribution. Additionally, the multi-watermarking based on hybrid multiplicative rule is firstly proposed and then analyzed theoretically with respect to two cases, i.e., the multi-embedding of same watermark sequence and the multi-embedding of different watermark sequences. The analysis emphasizes on four aspects, i.e., robustness, capacity, distortion and security, each of which considers two cases, i.e., the authorized embedding and unauthorized embedding. What is more, the locally optimum detector for multi-watermarking of hybrid multiplicative rule is reduced, and some potential attacks are investigated. Additionally, for each case, some suggestions are proposed to improve the system's performance. Finally, some comparative experiments are done, and results are given to show the validity of the theoretical analysis.

[1]  J. Nicholas Laneman,et al.  Variations on Information Embedding in Multiple Access and Broadcast Channels , 2010, IEEE Transactions on Information Theory.

[2]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Hyun Wook Kim,et al.  Selective correlation detector for additive spread spectrum watermarking in transform domain , 2010, Signal Process..

[4]  Hsiang-Cheh Huang,et al.  Metadata-based image watermarking for copyright protection , 2010, Simul. Model. Pract. Theory.

[5]  Hazem Al-Otum,et al.  A robust blind color image watermarking based on wavelet-tree bit host difference selection , 2010, Signal Process..

[6]  Andreas Uhl,et al.  Blind DT-CWT domain additive spread-spectrum watermark detection , 2009, 2009 16th International Conference on Digital Signal Processing.

[7]  Mauro Barni,et al.  A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..

[8]  Fan Zhang,et al.  Performance Evaluation of Multiple Watermarks System , 2007, Second Workshop on Digital Media and its Application in Museum & Heritages (DMAMH 2007).

[9]  Qiang Cheng,et al.  Generalized Embedding of Multiplicative Watermarks , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  Thomas S. Huang,et al.  Robust optimum detection of transform domain multiplicative watermarks , 2003, IEEE Trans. Signal Process..

[11]  Cong Jin,et al.  Multiple Digital Watermarking Scheme Based on ICA , 2007, Eighth International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS '07).

[12]  Spyros Sioutas,et al.  Applying robust multibit watermarks to digital images , 2009 .

[13]  Bülent Sankur,et al.  Robust Scaling-Based Image Watermarking Using Maximum-Likelihood Decoder With Optimum Strength Factor , 2009, IEEE Transactions on Multimedia.

[14]  Yôiti Suzuki,et al.  Multiple watermarks for stereo audio signals using phase-modulation techniques , 2005 .

[15]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[16]  Dimitris Kanellopoulos,et al.  Recent Advances in Multimedia Information System Security , 2009, Informatica.

[17]  Hanqiang Cao,et al.  Multiplicative Spread Spectrum Watermarks Detection Performance Analysis in Curvelet Domain , 2009, 2009 International Conference on E-Business and Information System Security.

[18]  Adrian S. Lewis,et al.  Image compression using the 2-D wavelet transform , 1992, IEEE Trans. Image Process..

[19]  Mauro Barni,et al.  Robust watermarking of still images for copyright protection , 1997, Proceedings of 13th International Conference on Digital Signal Processing.

[20]  Sergio A. Velastin,et al.  Intelligent Multimedia Analysis for Security Applications , 2012, Intelligent Multimedia Analysis for Security Applications.

[21]  C.-S. Lu,et al.  Near-Optimal Watermark Estimation and Its Countermeasure: Antidisclosure Watermark for Multiple Watermark Embedding , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[22]  Yuewei Dai,et al.  Optimum detection for Barni's multiplicative watermarking in DWT domain , 2008, 2008 Third International Conference on Communications and Networking in China.

[23]  H. K. Garg,et al.  Maximum-likelihood detection in DWT domain image watermarking using Laplacian modeling , 2005, IEEE Signal Processing Letters.

[24]  Fernando Pérez-González,et al.  Quantization-Based Data Hiding Robust to Linear-Time-Invariant Filtering , 2008, IEEE Transactions on Information Forensics and Security.