Power-spectrum condition for energy-efficient watermarking

A simple but powerful theoretical model for watermarking and attacks is presented. The attack consists of Wiener estimation of the watermark, followed by weighted feedback of the estimate to reduce the detector's correlation value. The Wiener attack is provably optimal, and it leads to the notion of energy-efficient watermarking, the generation of watermarks that resist Wiener estimation. It also leads to a meaningful way to measure watermark robustness. Designing watermarks to resist the attack produces a power-spectrum condition (PSC): the watermark's power spectrum should be a scaled version of the original document's. Experiments with signal models demonstrate the importance of the PSC and show that watermarks that fail to meet the PSC may be vulnerable to attack. These analytic predictions are confirmed with experiments on natural images. The paper provides a theoretical basis for the popular heuristic argument that a watermark should be embedded in the "perceptually significant frequency components" of the original document and discourages the use of watermarks whose power spectra are not closely matched to the original document's power spectrum.

[1]  Paul G. Flikkema,et al.  Spread-spectrum techniques for wireless communication , 1997, IEEE Signal Process. Mag..

[2]  Ton Kalker,et al.  Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.

[3]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[4]  Jürgen Herre,et al.  Digital Watermarking and Its Influence on Audio Quality , 1998 .

[5]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[6]  Bernd Girod,et al.  Digital watermarking of text, image, and video documents , 1998, Comput. Graph..

[7]  Monson H. Hayes,et al.  Statistical Digital Signal Processing and Modeling , 1996 .

[8]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[9]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.

[10]  Bernd Girod,et al.  Analysis of digital watermarks subjected to optimum linear filtering and additive noise , 2001, Signal Process..

[11]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[12]  Ja-Ling Wu,et al.  Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[13]  Bernd Girod,et al.  On the robustness and imperceptibility of digital fingerprints , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[14]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[15]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[16]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[17]  Zixiang Xiong,et al.  Multiresolution watermarking for images and video , 1999, IEEE Trans. Circuits Syst. Video Technol..

[18]  Michael G. Strintzis,et al.  Robust image watermarking in the subband or discrete cosine transform domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[19]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[20]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[21]  Jessica J. Fridrich,et al.  Comparing robustness of watermarking techniques , 1999, Electronic Imaging.

[22]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[23]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.