An Image Watermarking Scheme Based on Information Theoretic Principles

image watermarking, information hiding, side information In this report we investigate information hiding systems with non-malicious attack channels in which the decoder does not have access to the original source data. Recent works show that such information hiding systems can be viewed as communication systems with side information at the encoder. Based on this observation, we propose a novel watermarking scheme, named scaled bin encoding, which is based on capacity achieving random encoding scheme for an additive Gaussian channel with side information. This scheme out-performs previous watermarking techniques when applied to synthetic and imagery data. Furthermore, a theoretical and computational framework for the implementation of a family of information hiding schemes is proposed. This family, named binary modulation schemes, provides a computable expression for the theoretical information embedding rate, as well as fast encoding and decoding procedures. The decoding procedure is based on the maximum likelihood principle that improves upon the standard correlation based decoding techniques. We describe experimental results of implementing various binary modulation schemes for the additive Gaussian information hiding system and for DCT domain image watermarking .

[1]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[2]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[3]  Aaron D. Wyner,et al.  Channels with Side Information at the Transmitter , 1993 .

[4]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[5]  A. Lapidoth,et al.  On the Gaussian watermarking game , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[6]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[7]  A Lempel Hadamard and M-Sequence transforms are permutationally similar. , 1979, Applied optics.

[8]  Gregory W. Wornell,et al.  The duality between information embedding and source coding with side information and some applications , 2003, IEEE Trans. Inf. Theory.

[9]  Gregory W. Wornell,et al.  Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.

[10]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[11]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[12]  Brian Chen Digital watermarking, information embedding, and data hiding systems , 2000 .