Digital image data hiding using side information

La robustez es una cuestion clave para muchas aplicaciones potenciales de las tecnologias de ocultacion de datos (watermarking). La propuesta de usar informacion lateral en el codificador ha significado un avance significativo en la busqueda de metodos de ocultacion de datos mas eficientes. Sin embargo, en la practica no se ha fundamentado suficientemente el autentico impacto derviado de las ventajas teoricas de esta idea fundamental. Desde este punto de partida, esta tesis provee una nueva evaluacion de la robustez de las tecnologias de ocultacion de datos mas relevantes, poniendo enfasis en su implantacion en aplicaciones reales. Con este fin se comparan metodos que usan informacion lateral, tales como Dither Modulation (DM) y DM con compensacion de distorison (DC-DM, SCS) -realizacion practica y quasi-optima del esquema teorico estudiado por Costa-, con los metodos anteriores basados en tecnicas de espectro ensanchado y que no usan informacion lateral. El entorno de comparacion usa distorsiones aditivas aleatorias y la probabilidad de error en el decodificador. Los distintos metodos se comparan usando simulaciones con el metodo de Monte Carlo, utilizando tanto imagenes reales como datos sinteticos. Para confirmar nuestros resultados, se dan analisis teoricos precisos de la mayoria de los metodos considerados. Se estudian extensiones multidimensionales de los mismos para ofrecer una vision mas completa de las comparaciones. Los resultados muestran que los metodos que usan informacion lateral ofrecen un redimiento mejor para niveles de distorison moderados y bajos, siendo por otra parte mas sensibles al nivel y tipo de ataque. Ademas, se demuestra la imposibilidad de optimizar a priori estos metodos, lo que anade una vision menos optimista de su rendimiento potencial. Las conclusiones de esta comparacion permiten la propuesta y analisis de metodos de ocultacion de datos basados en la

[1]  Bernd Girod,et al.  Analysis of digital watermarks subjected to optimum linear filtering and additive noise , 2001, Signal Process..

[2]  Ingemar J. Cox,et al.  The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..

[3]  Joaquín Míguez,et al.  Turbo aided maximum likelihood channel estimation for space-time coded systems , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[4]  Gustavus J. Simmons,et al.  The history of subliminal channels , 1996, IEEE J. Sel. Areas Commun..

[5]  Fernando Pérez-González,et al.  Improving the performance of spatial watermarking of images using channel coding , 2000, Signal Process..

[6]  Thierry Pun,et al.  Optimal adaptive diversity watermarking with channel state estimation , 2001, IS&T/SPIE Electronic Imaging.

[7]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[8]  Gregory W. Wornell,et al.  Preprocessed and postprocessed quantization index modulation methods for digital watermarking , 2000, Electronic Imaging.

[9]  John Cocke,et al.  Optimal decoding of linear codes for minimizing symbol error rate (Corresp.) , 1974, IEEE Trans. Inf. Theory.

[10]  Stephen G. Wilson,et al.  SNR mismatch and online estimation in turbo decoding , 1998, IEEE Trans. Commun..

[11]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[12]  Fernando Pérez-González,et al.  Coding at the sample level for data hiding: turbo and concatenated codes , 2001, IS&T/SPIE Electronic Imaging.

[13]  Mauro Barni,et al.  A M.A.P. identification criterion for DCT-based watermarking , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[14]  R C Robertson,et al.  Digital Communications Over Fading Channels , 2004 .

[15]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[16]  Gregory W. Wornell,et al.  Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.

[17]  Ali N AkansuDepartment,et al.  Self-Noise Suppression Schemes In Blind Image Steganography , 1999 .

[18]  Fernando Pérez-González,et al.  Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[19]  B. Girod,et al.  Quantization watermarking , 2000, Electronic Imaging.

[20]  Gregory W. Wornell,et al.  Provably robust digital watermarking , 1999, Optics East.

[21]  Dariush Divsalar,et al.  A soft-input soft-output APP module for iterative decoding of concatenated codes , 1997, IEEE Communications Letters.

[22]  Thierry Pun,et al.  A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.

[23]  Juan R. Hern,et al.  Statistical Analysis of Watermarking Schemes for Copyright Protection of Images , 1999 .

[24]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[25]  A. Glavieux,et al.  Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1 , 1993, Proceedings of ICC '93 - IEEE International Conference on Communications.

[26]  Fernando Pérez-González,et al.  Hexagonal quantizers are not optimal for 2D data hiding , 2003, IS&T/SPIE Electronic Imaging.

[27]  Alessandro Neri,et al.  Blind quality assessment system for multimedia communications using tracing watermarking , 2003, IEEE Trans. Signal Process..

[28]  Pedro Comesaña Alfaro,et al.  Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm , 2004, IS&T/SPIE Electronic Imaging.

[29]  Jean-François Delaigle,et al.  Improving data hiding by using convolutional codes and soft-decision decoding , 2000, Electronic Imaging.

[30]  Bernd Girod,et al.  Digital Watermarking facing Attacks by Amplitude Scaling and Additive White Noise , 2002 .

[31]  William E. Ryan A Turbo Code Tutorial , 1997 .

[32]  J. Craig A new, simple and exact result for calculating the probability of error for two-dimensional signal constellations , 1991, MILCOM 91 - Conference record.

[33]  Norman C. Beaulieu,et al.  Analysis of equal gain diversity on Nakagami fading channels , 1991, IEEE Trans. Commun..

[34]  Fernando Pérez-González,et al.  Provably or probably robust data hiding? , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[35]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[36]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[37]  Norman C. Beaulieu,et al.  An infinite series for the computation of the complementary probability distribution function of a sum of independent random variables and its application to the sum of Rayleigh random variables , 1990, IEEE Trans. Commun..

[38]  Stephen G. Wilson,et al.  Digital Modulation and Coding , 1995 .

[39]  Gregory W. Wornell,et al.  Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[40]  B. Girod,et al.  A blind watermarking scheme based on structured codebooks , 2000 .

[41]  A. Huitson,et al.  Statistical Models in Applied Science. , 1976 .

[42]  Kwok H. Li,et al.  Iterative PDF estimation and decoding for CDMA systems with non-Gaussian characterisation , 2000 .

[43]  Sandro Scalise,et al.  Turbo coding for sample-level watermarking in the DCT domain , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[44]  Thierry Pun,et al.  Capacity-security analysis of data hiding technologies , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[45]  Abbas El Gamal,et al.  On the capacity of computer memory with defects , 1983, IEEE Trans. Inf. Theory.

[46]  S. Brink,et al.  Approaching the Dirty Paper Limit for Canceling Known Interference , 2003 .

[47]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .

[48]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[49]  Gregory W. Wornell,et al.  Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia , 2001, J. VLSI Signal Process..

[50]  Radford M. Neal,et al.  Near Shannon limit performance of low density parity check codes , 1996 .

[51]  F. Pérez-González,et al.  Coding and Synchronization: A Boost and a Bottleneck for the Development of Image Watermarking , 2000 .

[52]  A. Tirkel,et al.  Electronic water mark , 1993 .

[53]  L. Schuchman Dither Signals and Their Effect on Quantization Noise , 1964 .

[54]  Fernando Pérez-González,et al.  Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications , 2001, Signal Process..

[55]  Neri Merhav,et al.  An Image Watermarking Scheme Based on Information Theoretic Principles , 2001 .

[56]  Luc Vandendorpe,et al.  Turbo synchronization: an EM algorithm interpretation , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[57]  Dale K. Pace,et al.  The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .

[58]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[59]  B. S. Manjunath,et al.  A robust data hiding technique using multidimensional lattices , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.

[60]  Cormac Herley Why watermarking is nonsense , 2002, IEEE Signal Process. Mag..

[61]  Harald Ernst,et al.  A Fast Algorithm to Estimate the Distance Spectrum of Turbo Codes and Tail-Biting Turbo Codes , 2003, Telecommun. Syst..

[62]  Bernd Girod,et al.  Informed Watermarking , 2002 .

[63]  Ian R. Petersen,et al.  A minimax robust decoding algorithm , 2000, IEEE Trans. Inf. Theory.

[64]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[65]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[66]  T. Cover,et al.  Writing on colored paper , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).

[67]  Fernando Pérez-González,et al.  Quantized projection data hiding , 2002, Proceedings. International Conference on Image Processing.

[68]  Thierry Pun,et al.  Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.

[69]  Gottfried Ungerboeck,et al.  Channel coding with multilevel/phase signals , 1982, IEEE Trans. Inf. Theory.

[70]  Shlomo Shamai,et al.  Nested linear/Lattice codes for structured multiterminal binning , 2002, IEEE Trans. Inf. Theory.

[71]  Monica Borda,et al.  Turbo code protection of video watermark channel , 2001 .

[72]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[73]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[74]  Fernando Pérez-González,et al.  Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..

[75]  Allen Gersho,et al.  Asymptotically optimal block quantization , 1979, IEEE Trans. Inf. Theory.

[76]  Nam C. Phamdo,et al.  Turbo decoders which adapt to noise distribution mismatch , 1998, IEEE Communications Letters.

[77]  Sergio Benedetto,et al.  Design of parallel concatenated convolutional codes , 1996, IEEE Trans. Commun..

[78]  Fernando Pérez-González,et al.  Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images , 1998, IEEE J. Sel. Areas Commun..

[79]  Fernando Pérez-González,et al.  Improving data hiding performance by using quantization in a projected domain , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[80]  Fernando Pérez-González,et al.  Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation , 2002, Information Hiding.

[81]  Pierre Moulin,et al.  A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..

[82]  A. Lapidoth,et al.  Generalized writing on dirty paper , 2002, Proceedings IEEE International Symposium on Information Theory,.

[83]  Sae-Young Chung,et al.  Sphere-bound-achieving coset codes and multilevel coset codes , 2000, IEEE Trans. Inf. Theory.

[84]  K. Ramchandran,et al.  Turbo coded trellis-based constructions for data embedding: channel coding with side information , 2001, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256).

[85]  Ali N. Akansu,et al.  Floating signal constellations for multimedia steganography , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.

[86]  B. S. Manjunath,et al.  Color image embedding using multidimensional lattice structures , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[87]  Roberto Garello,et al.  A search for good convolutional codes to be used in the construction of turbo codes , 1998, IEEE Trans. Commun..

[88]  Geoffrey E. Hinton,et al.  A View of the Em Algorithm that Justifies Incremental, Sparse, and other Variants , 1998, Learning in Graphical Models.

[89]  Mehmet Kivanc Mihcak,et al.  ITERATIVELY DECODABLE CODES FOR WATERMARKING APPLICATIONS , 2000 .

[90]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[91]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[92]  Hugh Brunk Quantizer characteristics important for quantization index modulation , 2001, IS&T/SPIE Electronic Imaging.

[93]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.