Multiresolution digital watermarking: algorithms and implications for multimedia signals

The large-scale communication of multimedia data motivates the protection of digital information against illegal duplication and manipulation. This work is concerned with the development and use of digital watermarking technology to embed copyright and authentication codes, and hidden annotations within media content. We assess the appropriateness of watermarking for certain problems, broaden its usefulness to multimedia applications, and design and test three multiresolution digital watermarking techniques. We provide a communications paradigm for watermarking which describes principles underlying e ective data hiding strategies in analytic terms, and justify the performance gains of our schemes through the use of this framework. We introduce and formulate the problem of telltale tamper proo ng, and develop a fragile watermarking algorithm which, unlike traditional techniques, characterizes the distortions so that intentional doctoring can be distinguished from integritypreserving operations such as perceptual coding. Two other techniques are proposed for the problem of robust watermarking. In the rst method, data fusion concepts are incorporated to provide robust security in which the original media signal is needed to extract the hidden data. The second This work was support by the Natural Sciences and Engineering Research Council (NSERC) of Canada and by the Communications and Information Technology Ontario (CITO).

[1]  O. Rioul,et al.  Wavelets and signal processing , 1991, IEEE Signal Processing Magazine.

[2]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[3]  Kannan Ramchandran,et al.  Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[4]  Stéphane Mallat,et al.  Multifrequency channel decompositions of images and wavelet models , 1989, IEEE Trans. Acoust. Speech Signal Process..

[5]  Ioannis Pitas,et al.  Image watermarking using DCT domain constraints , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[6]  Jian Zhao,et al.  In business today and tomorrow , 1998, CACM.

[7]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[8]  Laure J. Chipman,et al.  Wavelets and image fusion , 1995, Optics + Photonics.

[9]  Gregory W. Wornell,et al.  Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[10]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[11]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[12]  Gordon W. Braudaway,et al.  Opportunities for watermarking standards , 1998, CACM.

[13]  Jean-Paul M. G. Linnartz,et al.  Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.

[14]  Minerva M. Yeung,et al.  Effective and ineffective digital watermarks , 1997, Proceedings of International Conference on Image Processing.

[15]  Deepa Kundur,et al.  A novel blind deconvolution scheme for image restoration using recursive filtering , 1998, IEEE Trans. Signal Process..

[16]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[17]  Gordon W. Braudaway,et al.  Protecting publicly-available images with an invisible image watermark , 1996, Proceedings of International Conference on Image Processing.

[18]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[19]  Kineo Matsui,et al.  Embedding a seal into a picture under orthogonal wavelet transform , 1996, Proceedings of the Third IEEE International Conference on Multimedia Computing and Systems.

[20]  T. Poggio Vision by man and machine. , 1984, Scientific American.

[21]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[22]  Ja-Ling Wu,et al.  Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[23]  Bernd Girod,et al.  Channel model for a watermark attack , 1999, Electronic Imaging.

[24]  Paul G. Flikkema,et al.  Spread-spectrum techniques for wireless communication , 1997, IEEE Signal Process. Mag..

[25]  Michael Scott,et al.  Fractal Based Image Steganography , 1996, Information Hiding.

[26]  I.J. Cox,et al.  Watermarking in the real world: an application to DVD , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).

[27]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.

[28]  Fernando Pérez-González,et al.  The impact of channel coding on the performance of spatial watermarking for copyright protection , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[29]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[30]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[31]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[32]  Bernd Girod,et al.  Digital watermarking of raw and compressed video , 1996, Other Conferences.

[33]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[34]  C.-C. Jay Kuo,et al.  An integrated progressive image coding and watermark system , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[35]  David H. Shur,et al.  On combining watermarking with perceptual coding , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[36]  Lawrence O'Gorman,et al.  Electronic Marking and Identification Techniques to Discourage Document Copying , 1995, IEEE J. Sel. Areas Commun..

[37]  Deepa Kundur,et al.  Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[38]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[39]  D. Hatzinakos,et al.  Semi-blind image restoration based on telltale watermarking , 1998, Conference Record of Thirty-Second Asilomar Conference on Signals, Systems and Computers (Cat. No.98CH36284).

[40]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[41]  D. Yocky Image merging and data fusion by means of the discrete two-dimensional wavelet transform , 1995 .

[42]  Mauro Barni,et al.  Robust watermarking of still images for copyright protection , 1997, Proceedings of 13th International Conference on Digital Signal Processing.

[43]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[44]  Richard G. Lane,et al.  Blind deconvolution of speckle images , 1992 .

[45]  I. Daubechies Orthonormal bases of compactly supported wavelets , 1988 .

[46]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[47]  John M. Acken,et al.  How watermarking adds value to digital content , 1998, CACM.

[48]  A.Z. Tirkel,et al.  Image watermarking-a spread spectrum application , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.

[49]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[50]  Mongi A. Abidi,et al.  Data fusion in robotics and machine intelligence , 1992 .

[51]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[52]  Gonzalo R. Arce,et al.  Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[53]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[54]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[55]  Ja-Ling Wu,et al.  Digital watermarking for video , 1997, Proceedings of 13th International Conference on Digital Signal Processing.

[56]  S. Leigh,et al.  Probability and Random Processes for Electrical Engineering , 1989 .

[57]  Deepa Kundur,et al.  Blind Image Deconvolution , 2001 .

[58]  Nikolas P. Galatsanos,et al.  Projection-based blind deconvolution , 1994 .

[59]  A. Murat Tekalp,et al.  Blur identification using the bispectrum , 1991, IEEE Trans. Signal Process..

[60]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[61]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[62]  Deepa Kundur,et al.  Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[63]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[64]  X G Xia,et al.  Wavelet transform based watermark for digital images. , 1998, Optics express.

[65]  Gonzalo R. Arce,et al.  A blind wavelet based digital signature for image authentication , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[66]  Robert J. Safranek,et al.  Signal compression based on models of human perception , 1993, Proc. IEEE.

[67]  Zixiang Xiong,et al.  Multiresolution watermarking for images and video , 1999, IEEE Trans. Circuits Syst. Video Technol..

[68]  H. Luetkepohl The Handbook of Matrices , 1996 .

[69]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[70]  Bo Tao,et al.  Adaptive watermarking in the DCT domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[71]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[72]  Peter Wayner Disappearing cryptography - being and nothingness on the net , 1996 .

[73]  Mark S. Sanders,et al.  Human Factors in Engineering and Design , 1957 .

[74]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[75]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[76]  Edward J. Delp,et al.  The effect of matching watermark and compression transforms in compressed color images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[77]  Gregory W. Wornell,et al.  Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.

[78]  Steven K. Rogers,et al.  Perceptual-based hyperspectral image fusion using multiresolution analysis , 1995 .