Informed Embedding for Multi-bit Watermarks

This paper reviews recent research on information-theoretic aspects of information hiding. Emphasis is placed on applications requiring high payload (e.g., covert communications). Information hiding may be viewed as a game between two teams (embedder/decoder vs. attacker), and optimal information-embedding and attack strategies may be developed in this context. This paper focuses on several such strategies, including a framework for developing near-optimal codes and universal decoders. The suboptimality of spread-spectrum strategies follows from the analysis. The theory is applied to image watermarking examples.

[1]  G.W. Wornell,et al.  An information-theoretic approach to the design of robust digital watermarking systems , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[2]  Prakash Narayan,et al.  Reliable Communication Under Channel Uncertainty , 1998, IEEE Trans. Inf. Theory.

[3]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[4]  Ingemar J. Cox,et al.  8 – Robust Watermarking , 2002 .

[5]  Kannan Ramchandran,et al.  Robust turbo-based data hiding for image and video sources , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[6]  J. Chou,et al.  On the duality between distributed source coding and data hiding , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).

[7]  Neri Merhav On random coding error exponents of watermarking systems , 2000, IEEE Trans. Inf. Theory.

[8]  Pierre Moulin,et al.  The zero-rate spread-spectrum watermarking game , 2003, IEEE Trans. Signal Process..

[9]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[10]  G. W. Wornell,et al.  On authentication with distortion constraints , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).

[11]  Shlomo Shamai,et al.  Nested linear/Lattice codes for structured multiterminal binning , 2002, IEEE Trans. Inf. Theory.

[12]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[13]  A. Viterbi CDMA: Principles of Spread Spectrum Communication , 1995 .

[14]  Pierre Moulin,et al.  The Fisher information game for optimal design of synchronization patterns in blind watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[15]  Neri Merhav,et al.  On the capacity game of public watermarking systems , 2004, IEEE Transactions on Information Theory.

[16]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[17]  Neri Merhav,et al.  Identification in the presence of side information with application to watermarking , 2001, IEEE Trans. Inf. Theory.

[18]  Pierre Moulin,et al.  A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..

[19]  B. Girod,et al.  A blind watermarking scheme based on structured codebooks , 2000 .

[20]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[21]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[22]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[23]  Claude E. Shannon,et al.  Channels with Side Information at the Transmitter , 1958, IBM J. Res. Dev..

[24]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.

[25]  Ingemar J. Cox,et al.  Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[26]  T. Cover,et al.  Writing on colored paper , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).

[27]  Kannan Ramchandran,et al.  Robust optimization solution to the data hiding problem using distributed source coding principles , 2000, Electronic Imaging.

[28]  Mahalingam Ramkumar Data hiding in multimedia - theory and applications , 1999 .