Watermark design based on Steiner triple systems

Constructing a set of watermarks of a specific structure may be one requirement for robust watermarking. This study aims to use the structure of Steiner triple systems to generate new watermarks. That is, the new watermark is a Steiner triple system built by using two smaller ones. The structure properties are examined to recognize watermarks at the receiver site. The main advantage is no information other than the mathematical structure has to be known for watermark recognition.Theoretical proof is given to verify the proposed watermark design method, and the experiment is conducted to confirm the theoretical behavior of the generated watermarks under random noise.

[1]  Ivan B. Djordjevic,et al.  Quantum LDPC Codes from Balanced Incomplete Block Designs , 2008, IEEE Communications Letters.

[2]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.

[3]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[4]  Pierre Moulin,et al.  A Message-Passing Approach to Combating Desynchronization Attacks , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Zhi-Fang Yang,et al.  Robustness of Structure-Based Watermark by Using Balanced Incomplete Block Designs , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[6]  Yue Zhang,et al.  Affine Legendre Moment Invariants for Image Watermarking Robust to Geometric Distortions , 2011, IEEE Transactions on Image Processing.

[7]  Bahram Honary,et al.  New constructions of quasi-cyclic LDPC codes based on special classes of BIBD's for the AWGN and binary erasure channels , 2008, IEEE Transactions on Communications.

[8]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[9]  Darryn Bryant,et al.  A proof of Lindner's conjecture on embeddings of partial Steiner triple systems , 2009 .

[10]  Judith L. Gersting Mathematical structures for computer science , 1982 .

[11]  Yau-Hwang Kuo,et al.  Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions , 2012, Signal Process..

[12]  Jie Yang,et al.  A Robust Anti-collusion Coding in Digital Fingerprinting System , 2006, 2006 8th international Conference on Signal Processing.

[13]  Douglas R Stinson,et al.  Contemporary design theory : a collection of surveys , 1992 .

[14]  Jie Yang,et al.  The digital fingerprint coding based on LDPC , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..

[15]  Irene Cheng,et al.  Balanced incomplete designs for 3D perceptual quality estimation , 2005, IEEE International Conference on Image Processing 2005.

[16]  Ashok Patel,et al.  Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding , 2011, IEEE Transactions on Signal Processing.

[17]  C. Colbourn,et al.  The CRC handbook of combinatorial designs , edited by Charles J. Colbourn and Jeffrey H. Dinitz. Pp. 784. $89.95. 1996. ISBN 0-8493-8948-8 (CRC). , 1997, The Mathematical Gazette.

[18]  Jingshown Wu,et al.  Noncoherent Spectral/Spatial OCDMA System Using Two-Dimensional Hybrid Codes , 2010, IEEE/OSA Journal of Optical Communications and Networking.

[20]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[21]  Antoine Liutkus,et al.  Informed source separation through spectrogram coding and data embedding , 2012, Signal Process..

[22]  Heung-Kyu Lee,et al.  Averaging attack resilient video fingerprinting , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[23]  Zhenxing Qian,et al.  Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.

[24]  Shiguo Lian,et al.  On the hybrid multi-watermarking , 2012, Signal Process..

[25]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[26]  Masahiro Okuda,et al.  High Dynamic Range Image Watermarking Robust Against Tone-Mapping Operators , 2011, IEEE Transactions on Information Forensics and Security.

[27]  Geoffrey Martin,et al.  Small embeddings for partial triple systems of odd index , 2012, J. Comb. Theory, Ser. A.

[28]  Quan Liu,et al.  Hierarchical reversible data hiding based on statistical information: Preventing embedding unbalance , 2012, Signal Process..

[29]  Kevin T. Phelps,et al.  The Perfect Binary One-Error-Correcting Codes of Length 15: Part II—Properties , 2009, IEEE Transactions on Information Theory.

[30]  Jiann-Der Lee,et al.  International Conference on Intelligent Information Hiding and Multimedia Signal Processing , 2008 .

[31]  Jia-Guu Leu,et al.  Enlargement of Balanced-Incomplete-Block-Designs-Based Watermarks , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[32]  Peter J. Cameron,et al.  A brief introduction to design theory , 1975 .

[33]  Hwai-Tsu Hu,et al.  A dual cepstrum-based watermarking scheme with self-synchronization , 2012, Signal Process..

[34]  F. Solov'eva,et al.  On the Steiner quadruple systems of small rank which are embeddable into extended perfect binary codes , 2013 .