A New Scalar Quantization Method for Digital Image Watermarking

A new technique utilizing Scalar Quantization is designed in this paper in order to be used for Digital Image Watermarking (DIW). Efficiency of the technique is measured in terms of distortions of the original image and robustness under different kinds of attacks, with particular focus on Additive White Gaussian Noise (AWGN) and Gain Attack (GA). The proposed technique performance is affirmed by comparing with state-of-the-art methods including Quantization Index Modulation (QIM), Distortion Compensated QIM (DC-QIM), and Rational Dither Modulation (RDM). Considerable improvements demonstrated by the method are due to a new form of distribution of quantized samples and a procedure that recovers a watermark after GA. In contrast to other known quantization methods, the detailed method here stipulates asymmetric distribution of quantized samples. This creates a distinctive feature and is expressed numerically by one of the proposed criteria. In addition, several realizations of quantization are considered and explained using a concept of Initial Data Loss (IDL) which helps to reduce watermarking distortions. The procedure for GA recovery exploits one of the two criteria of asymmetry. The accomplishments of the procedure are due to its simplicity, computational lightness, and sufficient precision of estimation of unknown gain factor.

[1]  Nora Cuppens-Boulahia,et al.  Watermarking to Enforce Medical Image Access and Usage Control Policy , 2010, 2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems.

[2]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[3]  Alan C. Bovik,et al.  Image information and visual quality , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[4]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[5]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[6]  M. Juhola,et al.  A new blind adaptive watermarking method based on singular value decomposition , 2013, PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System.

[7]  Ton Kalker,et al.  Adaptive quantization watermarking , 2004, IS&T/SPIE Electronic Imaging.

[8]  A. Aydin Alatan,et al.  Forbidden Zone Data Hiding , 2006, 2006 International Conference on Image Processing.

[9]  Hamid Reza Tohidypour,et al.  Robust quantisation index modulation-based approach for image watermarking , 2013, IET Image Process..

[10]  C. Mosquera,et al.  Rational dither modulation: a high-rate data-hiding method invariant to gain attacks , 2005, IEEE Transactions on Signal Processing.

[11]  Gregory W. Wornell,et al.  Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.

[12]  Ali N. Akansu,et al.  Signaling methods for multimedia steganography , 2004, IEEE Transactions on Signal Processing.

[13]  Wenjun Zeng,et al.  Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver , 2008, IEEE Transactions on Multimedia.

[14]  Mauro Barni,et al.  Robust watermarking of still images for copyright protection , 1997, Proceedings of 13th International Conference on Digital Signal Processing.

[15]  Xiaojun Wu,et al.  Universal blind image quality assessment using contourlet transform and singular-value decomposition , 2014, J. Electronic Imaging.

[16]  R.L. Lagendijk,et al.  Amplitude Scale Estimation for Quantization-Based Watermarking , 2006, IEEE Transactions on Signal Processing.

[17]  Alessandro Piva,et al.  Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues , 2013, IEEE Signal Processing Magazine.

[18]  Fernando Pérez-González,et al.  Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[19]  Maria Petrou,et al.  Image processing - the fundamentals , 1999 .

[20]  Martin Reisslein,et al.  Objective Video Quality Assessment Methods: A Classification, Review, and Performance Comparison , 2011, IEEE Transactions on Broadcasting.

[21]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[22]  Jie Ding,et al.  Performance analysis and improvement of dither modulation under the composite attacks , 2012, EURASIP J. Adv. Signal Process..

[23]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.