Optimal Watermark Embedding and Detection Strategies Under General Worst Case Attacks

We revisit the problem of optimal watermark embedding and detection for computationally limited detectors under general attack channels. First, a formal definition of the problem is given for general attack channels under the Neyman-Pearson criterion of optimality. Later, asymptotically optimal decision regions are offered, assuming that the detector is computationally limited and that the attack channel is strongly exchangeable. These results are extended to general attack channels where random watermark sequences are considered. The optimal embedding rule is offered and the worst attack channel is identified.

[1]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[2]  Neri Merhav,et al.  Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Transactions on Information Theory.

[3]  Harry L. Van Trees,et al.  Detection, Estimation, and Modulation Theory, Part I , 1968 .

[4]  Neri Merhav,et al.  On the error exponent and capacity games of private watermarking systems , 2003, IEEE Trans. Inf. Theory.

[5]  Neri Merhav Universal detection of messages via finite-state channels , 2000, IEEE Trans. Inf. Theory.

[6]  Edward J. Delp,et al.  Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..

[7]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[8]  Jean-Paul M. G. Linnartz,et al.  Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.

[9]  Teddy Furon,et al.  A Constructive and Unifying Framework for Zero-Bit Watermarking , 2006, IEEE Transactions on Information Forensics and Security.

[10]  Neri Merhav,et al.  An Information – Theoretic View of Watermark Embedding – Detection and Geometric Attacks , 2005 .

[11]  Jeffrey A. Bloom,et al.  Computing the Probability of False Watermark Detection , 1999, Information Hiding.

[12]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[13]  Ingemar J. Cox,et al.  Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[14]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.