The role of information theory in watermarking and its application to image watermarking

This paper reviews the role of information theory in characterizing the fundamental limits of watermarking systems and in guiding the development of optimal watermark embedding algorithms and optimal attacks. Watermarking can be viewed as a communication problem with side information (in the form of the host signal and/or a cryptographic key) available at the encoder and the decoder. The problem is mathematically defined by distortion constraints, by statistical models for the host signal, and by the information available in the game between the information hider, the attacker, and the decoder. In particular, information theory explains why the performance of watermark decoders that do not have access to the host signal may surprisingly be as good as the performance of decoders that know the host signal. The theory is illustrated with several examples, including an application to image watermarking. Capacity expressions are derived under a parallel-Gaussian model for the host-image source. Sparsity is the single most important property of the source that determines capacity.

[1]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[2]  Frank Bossen,et al.  Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.

[3]  Prakash Narayan,et al.  Reliable Communication Under Channel Uncertainty , 1998, IEEE Trans. Inf. Theory.

[4]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[5]  Bernd Girod,et al.  Robustness of a blind image watermarking scheme , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[6]  Claude E. Shannon,et al.  Channels with Side Information at the Transmitter , 1958, IBM J. Res. Dev..

[7]  Pierre Moulin,et al.  An information-theoretic model for image watermarking and data hiding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[8]  Pierre Moulin,et al.  The Fisher information game for optimal design of synchronization patterns in blind watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[9]  J.A. O'Sullivan,et al.  Information theoretic analysis of steganography , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[10]  Mauro Barni,et al.  Capacity of full frame DCT image watermarks , 2000, IEEE Trans. Image Process..

[11]  Martin Vetterli,et al.  Rate-distortion analysis of spike processes , 1999, Proceedings DCC'99 Data Compression Conference (Cat. No. PR00096).

[12]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of watermarking , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[13]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[14]  Kannan Ramchandran,et al.  Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[15]  Neri Merhav,et al.  Identification in the presence of side information with application to watermarking , 2001, IEEE Trans. Inf. Theory.

[16]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999 .

[17]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[18]  Abbas El Gamal,et al.  On the capacity of computer memory with defects , 1983, IEEE Trans. Inf. Theory.

[19]  Pierre Moulin,et al.  A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..

[20]  Bernd Girod,et al.  Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[21]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[22]  Charles F. Hockett,et al.  A mathematical theory of communication , 1948, MOCO.

[23]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[24]  Kannan Ramchandran,et al.  Robust optimization solution to the data hiding problem using distributed source coding principles , 2000, Electronic Imaging.

[25]  Ali N. Akansu,et al.  Information theoretic bounds for data hiding in compressed images , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[26]  Markus G. Kuhn,et al.  Information hiding-A survey : Identification and protection of multimedia information , 1999 .

[27]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[28]  Arun N. Netravali,et al.  Digital Pictures: Representation and Compression , 1988 .

[29]  Sushil K. Bhattacharjee,et al.  Towards second generation watermarking schemes , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[30]  Prakash Narayan,et al.  Gaussian arbitrarily varying channels , 1987, IEEE Trans. Inf. Theory.

[31]  Tamer Basar,et al.  A complete characterization of minimax and maximin encoder- decoder policies for communication channels with incomplete statistical description , 1985, IEEE Trans. Inf. Theory.

[32]  Rudolf Ahlswede,et al.  Identification via channels , 1989, IEEE Trans. Inf. Theory.

[33]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[34]  Neri Merhav On random coding error exponents of watermarking systems , 2000, IEEE Trans. Inf. Theory.

[35]  Robert J. Safranek,et al.  Signal compression based on models of human perception , 1993, Proc. IEEE.

[36]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.