An Improved Multiplicative Spread Spectrum Embedding Scheme for Data Hiding

This paper presents an improved multiplicative spread spectrum (IMSS) embedding scheme for data hiding. We first analyze the error probability of the conventional multiplicative spread spectrum (MSS) scheme and derive the corresponding channel capacity and security level. It is noted that the interference effect of the host signal causes the distribution leakage and contributes to the decoding performance degradation. Since the host signal and the decoder structure information are available at the encoder side, the proposed IMSS scheme exploits both the correlation between the host signal and the watermark signal and the decoder structure in embedding the bit information to reduce the host interference effect. We can show that, compared with MSS, the proposed IMSS maintains the simple decoder structure and does not require additional information for decoding. We also analyze the decoding performances of MSS and IMSS in the presence of additional Gaussian noise. Simulation and real image results illustrate the superiority of the proposed IMSS data hiding scheme over the conventional MSS scheme.

[1]  Neri Merhav,et al.  Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Transactions on Information Theory.

[2]  Mauro Barni,et al.  Optimum decoding and detection of multiplicative watermarks , 2003, IEEE Trans. Signal Process..

[3]  M. Barni,et al.  Informed watermarking by means of orthogonal and pseudo-random dirty paper coding , 2005 .

[4]  Darko Kirovski,et al.  Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..

[5]  Fernando Pérez-González,et al.  Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..

[6]  Mauro Barni,et al.  Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding , 2005, IEEE Transactions on Signal Processing.

[7]  Bo Zhang,et al.  Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks , 2007, IEEE Transactions on Information Forensics and Security.

[8]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[9]  Mohammad Ali Akhaee,et al.  Robust Multiplicative Patchwork Method for Audio Watermarking , 2009, IEEE Transactions on Audio, Speech, and Language Processing.

[10]  Seyed Mohammad Ahadi,et al.  A Logarithmic Quantization Index Modulation for Perceptually Better Data Hiding , 2010, IEEE Transactions on Image Processing.

[11]  Pierre Moulin,et al.  Design and statistical analysis of a hash-aided image watermarking system , 2004, IEEE Transactions on Image Processing.

[12]  Panagiotis Tsakalides,et al.  Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models , 2005, IEEE Transactions on Multimedia.

[13]  Z. Jane Wang,et al.  A Framework of Multiplicative Spread Spectrum Embedding for Data Hiding: Performance, Decoder and Signature Design , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[14]  Jidong Zhong,et al.  An Enhanced Multiplicative Spread Spectrum Watermarking Scheme , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[15]  Fernando Pérez-González,et al.  Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack , 2008, IEEE Transactions on Information Forensics and Security.

[16]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[17]  Z. Jane Wang,et al.  Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding , 2011, IEEE Transactions on Information Forensics and Security.

[18]  Fernando Pérez-González,et al.  Spread-Spectrum Watermarking Security , 2009, IEEE Transactions on Information Forensics and Security.

[19]  C. Mosquera,et al.  Rational dither modulation: a high-rate data-hiding method invariant to gain attacks , 2005, IEEE Transactions on Signal Processing.

[20]  Wenjun Zeng,et al.  Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Transactions on Information Forensics and Security.

[21]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[22]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[23]  Fernando Pérez-González,et al.  Security of Lattice-Based Data Hiding Against the Known Message Attack , 2006, IEEE Transactions on Information Forensics and Security.

[24]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[25]  Pietro Guccione,et al.  Hyperbolic RDM for Nonlinear Valumetric Distortions , 2009, IEEE Transactions on Information Forensics and Security.

[26]  Farrokh Marvasti,et al.  Robust audio and speech watermarking using Gaussian and Laplacian modeling , 2010, Signal Process..

[27]  Bruno O. Shubert,et al.  Random variables and stochastic processes , 1979 .

[28]  Qiang Cheng,et al.  Generalized Embedding of Multiplicative Watermarks , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[29]  Thomas S. Huang,et al.  Robust optimum detection of transform domain multiplicative watermarks , 2003, IEEE Trans. Signal Process..

[30]  Nikolas P. Galatsanos,et al.  New Additive Watermark Detectors Based On A Hierarchical Spatially Adaptive Image Model , 2008, IEEE Transactions on Information Forensics and Security.