Communication and information theory in watermarking: a survey

This paper presents a review of some influential work in the area of digital watermarking using communications and information-theoretic analysis. After a brief introduction, some popular approaches are classified into different groups and an overview of various algorithms and analysis is provided. Insights and potential future trends in the area of watermarking theory are discussed.

[1]  J.A. O'Sullivan,et al.  Information theoretic analysis of steganography , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[2]  Deepa Kundur,et al.  Transform-based hybrid data hiding for improved robustness in the presence of perceptual coding , 2001, SPIE Optics + Photonics.

[3]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of watermarking , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[4]  Tohru Kohda,et al.  Digital watermarking through CDMA channels using spread spectrum techniques , 2000, 2000 IEEE Sixth International Symposium on Spread Spectrum Techniques and Applications. ISSTA 2000. Proceedings (Cat. No.00TH8536).

[5]  Ton Kalker,et al.  A Reliability Model for the Detection of Electronic Watermarks in Digital Images; Symposium on Communications and Vehicular Technology (5th) Held in Enschede, The Netherlands on Oct 1997 , 1997 .

[6]  Ingemar J. Cox,et al.  Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[7]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[8]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[9]  Deepa Kundur Implications for high capacity data hiding in the presence of lossy compression , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[10]  Oscar C. Au,et al.  Image watermarking using spread spectrum technique in log-2-spatio domain , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[11]  J. G. Gander,et al.  An introduction to signal detection and estimation , 1990 .

[12]  A. Lapidoth,et al.  On the Gaussian watermarking game , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[13]  Jean-Paul M. G. Linnartz,et al.  Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.

[14]  Gregory W. Wornell,et al.  Achievable performance of digital watermarking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[15]  Fernando Pérez-González,et al.  Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images , 1998, IEEE J. Sel. Areas Commun..

[16]  Deepa Kundur Energy allocation for high-capacity watermarking in the presence of compression , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[17]  Deepa Kundur,et al.  Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[18]  Deepa Kundur,et al.  The choice of watermark domain in the presence of compression , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[19]  Bernd Girod,et al.  On the robustness and imperceptibility of digital fingerprints , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[20]  Pierre Moulin,et al.  An information-theoretic model for image watermarking and data hiding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[21]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[22]  Mauro Barni,et al.  Capacity of full frame DCT image watermarks , 2000, IEEE Trans. Image Process..

[23]  Gabriela Csurka,et al.  A Bayesian approach to spread spectrum watermark detection and secure copyright protection for digital image libraries , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).

[24]  Thierry Pun,et al.  A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.

[25]  R. R. Clarke Transform coding of images , 1985 .

[26]  Gregory W. Wornell,et al.  Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia , 2001, J. VLSI Signal Process..

[27]  Jean-Paul M. G. Linnartz,et al.  Optimal detection of multiplicative watermarks , 2000, 2000 10th European Signal Processing Conference.

[28]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[29]  Juan R. Hern,et al.  Statistical Analysis of Watermarking Schemes for Copyright Protection of Images , 1999 .

[30]  Jean-Paul M. G. Linnartz,et al.  Detecting electronic watermarks in digital video , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[31]  Fernando Pérez-González,et al.  Statistical analysis of watermarking schemes for copyright protection of images , 1999, Proc. IEEE.

[32]  Jean-Paul M. G. Linnartz,et al.  Improved watermark detection reliability using filtering before correlation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[33]  Mauro Barni,et al.  Robust video watermarking for wireless multimedia communications , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[34]  Thierry Pun,et al.  Optimal adaptive diversity watermarking with channel state estimation , 2001, IS&T/SPIE Electronic Imaging.

[35]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[36]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[37]  Bernd Girod,et al.  Fundamental performance limits of power-spectrum condition-compliant watermarks , 2000, Electronic Imaging.

[38]  Deepa Kundur,et al.  Diversity and attack characterization for improved robust watermarking , 2001, IEEE Trans. Signal Process..

[39]  Jean-Paul M. G. Linnartz,et al.  Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[40]  Mauro Barni,et al.  Capacity of the watermark channel: how many bits can be hidden within a digital image? , 1999, Electronic Imaging.

[41]  Thierry Pun,et al.  Content adaptive watermarking based on a stochastic multiresolution image modeling , 2000, 2000 10th European Signal Processing Conference.

[42]  Bernd Girod,et al.  Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[43]  Fernando Pérez-González,et al.  The impact of channel coding on the performance of spatial watermarking for copyright protection , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[44]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.