Digital image watermarking: its formal model, fundamental properties and possible attacks

While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present, their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.

[1]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[2]  Ton Kalker,et al.  Capacity bounds and constructions for reversible data-hiding , 2003, IS&T/SPIE Electronic Imaging.

[3]  Jeho Nam,et al.  Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[5]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[6]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[7]  Tieyong Zeng,et al.  Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.

[8]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[9]  Jeho Nam,et al.  A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[10]  Jessica J. Fridrich,et al.  Comparing robustness of watermarking techniques , 1999, Electronic Imaging.

[11]  Jean-Yves Chouinard,et al.  Security of ownership watermarking of digital images based on singular value decomposition , 2010, J. Electronic Imaging.

[12]  C. Roux,et al.  Mixed Reversible and RONI Watermarking for Medical Image Reliability Protection , 2007, 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[13]  Pierre Moulin,et al.  A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..

[14]  Stefan Katzenbeisser,et al.  Watermarking schemes provably secure against copy and ambiguity attacks , 2003, DRM '03.

[15]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[16]  Stefan Katzenbeisser,et al.  Security analysis of public key watermarking schemes , 2001, SPIE Optics + Photonics.

[17]  Jiri Fridrich,et al.  Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.

[18]  Mauro Barni,et al.  Capacity of full frame DCT image watermarks , 2000, IEEE Trans. Image Process..

[19]  Colin Boyd,et al.  Developing a Digital Image Watermarking Model , 2011, 2011 International Conference on Digital Image Computing: Techniques and Applications.

[20]  Husrev T. Sencar,et al.  Security issues in watermarking applications - a deeper look , 2006, MCPS '06.

[21]  Shiguo Lian,et al.  Security Analysis of Content-Based Watermarking Authentication Framework , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[22]  William A. Pearlman,et al.  Capacity of Steganographic Channels , 2005, IEEE Transactions on Information Theory.

[23]  Zi Lin,et al.  A Multipurpose Public-Key Cryptosystem Based Image Watermarking , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[24]  Christian Roux,et al.  Reversible Watermarking for Knowledge Digest Embedding and Reliability Control in Medical Images , 2009, IEEE Transactions on Information Technology in Biomedicine.

[25]  Jian Zhao,et al.  A generic digital watermarking model , 1998, Comput. Graph..

[26]  Mauro Barni,et al.  A general framework for robust watermarking security , 2003, Signal Process..

[27]  Colin Boyd,et al.  A Review of Medical Image Watermarking Requirements for Teleradiology , 2013, Journal of Digital Imaging.

[28]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[29]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[30]  G. Coatrieux,et al.  An additive and lossless watermarking method based on invariant image approximation and Haar wavelet transform , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.

[31]  Xiaojun Qi,et al.  A robust content-based digital image watermarking scheme , 2007, Signal Process..

[32]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[33]  H. Y. Kim,et al.  Toward a secure public-key blockwise fragile authentication watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[34]  Thomas Mittelholzer,et al.  An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.

[35]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[36]  Anastasios Tefas,et al.  Image Watermarking: Techniques and Applications , 2009 .

[37]  Christophe De Vleeschouwer,et al.  Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..

[38]  Xiao Zeng,et al.  Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.

[39]  Frank Y. Shih,et al.  Robust watermarking and compression for medical images based on genetic algorithms , 2005, Inf. Sci..

[40]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[41]  Stefan Katzenbeisser,et al.  A Computational Model for Watermark Robustness , 2006, Information Hiding.

[42]  Yu-Chen Hu,et al.  Reversible image hiding scheme using predictive coding and histogram shifting , 2009, Signal Process..

[43]  Yongjian Hu,et al.  DE-Based Reversible Data Hiding With Improved Overflow Location Map , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[44]  Ton Kalker,et al.  Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[45]  Yu Nenghai,et al.  Practical analysis of watermarking capacity , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[46]  Jianguo Zhang,et al.  Evaluation of security algorithms used for security processing on DICOM images , 2005, SPIE Medical Imaging.

[47]  Nasir D. Memon,et al.  Practical Security of Non-Invertiblewatermarking Schemes , 2007, 2007 IEEE International Conference on Image Processing.

[48]  Jeng-Shyang Pan,et al.  Reversible data hiding based on multilevel histogram modification and sequential recovery , 2011 .

[49]  Colin Boyd,et al.  Counterfeiting attacks on block-wise dependent fragile watermarking schemes , 2013, SIN.

[50]  Tian-ge Zhuang,et al.  A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data , 2009, Journal of Digital Imaging.

[51]  Oscar C. Au,et al.  A capacity estimation technique for JPEG-to-JPEG image watermarking , 2003, IEEE Trans. Circuits Syst. Video Technol..

[52]  Hui Li,et al.  Reversible data hiding based on block median preservation , 2011, Inf. Sci..

[53]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[54]  Dinu Coltuc,et al.  Capacity control of reversible watermarking by two-thresholds embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[55]  Rémy Boyer,et al.  Security evaluation of informed watermarking schemes , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[56]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[57]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[58]  Ingemar J. Cox,et al.  Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..

[59]  Pierre Moulin,et al.  An information-theoretic model for image watermarking and data hiding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[60]  Jessica J. Fridrich,et al.  Lossless Data Embedding—New Paradigm in Digital Watermarking , 2002, EURASIP J. Adv. Signal Process..

[61]  Chin-Chen Chang,et al.  Multilevel reversible data hiding based on histogram modification of difference images , 2008, Pattern Recognit..

[62]  Colin Boyd,et al.  Utilizing Least Significant Bit-Planes of RONI Pixels for Medical Image Watermarking , 2013, 2013 International Conference on Digital Image Computing: Techniques and Applications (DICTA).

[63]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[64]  Hae-Yeoun Lee,et al.  Reversible data hiding exploiting spatial correlation between sub-sampled images , 2009, Pattern Recognit..

[65]  Mauro Barni,et al.  Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..

[66]  Henk J. A. M. Heijmans,et al.  Reversible data embedding into images using wavelet techniques and sorting , 2005, IEEE Transactions on Image Processing.

[67]  Dinu Coltuc,et al.  Fragile and robust watermarking by histogram specification , 2002, IS&T/SPIE Electronic Imaging.

[68]  Jean-Luc Dugelay,et al.  Blind detection of malicious alterations on still images using robust watermarks , 2000 .

[69]  Reihaneh Safavi-Naini,et al.  How to Compare Image Watermarking Algorithms , 2009, Trans. Data Hiding Multim. Secur..

[70]  Benoit M. Macq,et al.  Geometrically invariant watermarking using feature points , 2002, IEEE Trans. Image Process..

[71]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[72]  Ton Kalker,et al.  Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.

[73]  Ingemar J. Cox,et al.  The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..

[74]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.

[75]  J.A. O'Sullivan,et al.  Information theoretic analysis of steganography , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[76]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[77]  H. Nyeem,et al.  On the robustness and security of digital image watermarking , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).

[78]  Xuelong Li,et al.  A local Tchebichef moments-based robust image watermarking , 2009, Signal Process..

[79]  H. K. Dai,et al.  Content-Based Image Watermarking Via Public-Key Cryptosystems , 2007, ICCSA.

[80]  Zhang Hongbin,et al.  Digital watermarking capacity analysis in wavelet domain , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..

[81]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[82]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.