A new two-dimensional quantization method for digital image watermarking

We propose a new technique of Distortion Compensation (DC) for the two dimensional Quincunx Lattice Quantization that is used in watermarking. The choice of a new direction of quantization is explained by the form of Voronoi cell of the lattice elements. Parameter a controls DC and can be adjusted to maximize the mutual information between embedded and detected message in a noisy channel. For a special case of initial distribution of original samples, quantization distortion is estimated and expressed analytically. Experimental evaluation of robustness under Additive White Gaussian Noise (AWGN) is conducted using natural images and compared with several other known two-dimensional Lattice as well as Scalar Quantization methods with conventional DC. Criterion of Watermark to Noise Ratio (WNR) was used for comparison. Among the most important findings related to the Modified Quincunx are: manipulating only a half of samples required in contrast to the other two-dimensional methods; considerably increased mutual information under low WNR; identical to the conventional Quincunx procedure of watermark extraction (decoding).

[1]  R. Zamir,et al.  On lattice quantization noise , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[2]  Ralf Steinmetz,et al.  Robust MPEG video watermarking technologies , 1998, MULTIMEDIA '98.

[3]  Victor A. Skormin,et al.  SVD-Based Approach to Transparent Embedding Data into Digital Images , 2001, MMM-ACNS.

[4]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[5]  Josep Domingo-Ferrer,et al.  Invertible spread-spectrum watermarking for image authentication and multilevel access to precision-critical watermarked images , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.

[6]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[7]  Edward J. Delp,et al.  Benchmarking of image watermarking algorithms for digital rights management , 2004, Proceedings of the IEEE.

[8]  A. Aydin Alatan,et al.  Data hiding using trellis coded quantization , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[9]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[10]  Fernando Pérez-González,et al.  An accurate analysis of scalar quantization-based data hiding , 2006, IEEE Transactions on Information Forensics and Security.

[11]  Fernando Pérez-González,et al.  On distortion-compensated dither modulation data-hiding with repetition coding , 2006, IEEE Transactions on Signal Processing.

[12]  Soo-Chang Pei,et al.  Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm , 2006, ASIACCS '06.

[13]  Xiaofeng Wang,et al.  A new implementation of trellis coded quantization based data hiding , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[14]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[15]  Nora Cuppens-Boulahia,et al.  Watermarking to Enforce Medical Image Access and Usage Control Policy , 2010, 2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems.

[16]  Martin Reisslein,et al.  Objective Video Quality Assessment Methods: A Classification, Review, and Performance Comparison , 2011, IEEE Transactions on Broadcasting.

[17]  Stefan Katzenbeisser,et al.  Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[18]  M. Juhola,et al.  A new blind adaptive watermarking method based on singular value decomposition , 2013, PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System.

[19]  Martti Juhola,et al.  Quantization Based Watermarking Approach with Gain Attack Recovery , 2014, 2014 International Conference on Digital Image Computing: Techniques and Applications (DICTA).

[20]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .