Watermarking via optimization algorithms for quantizing randomized semi-global image statistics

We introduce a novel approach for blind and semi-blind watermarking and apply it to images. We derive randomized robust semi-global statistics of images in a suitable transform domain (wavelets in case of images) and quantize them in order to embed the watermark. Quantization is effectively carried out by embedding to the host a computed sequence, which is obtained by solving an optimization problem whose parameters are known to the information hider but unknown to the attacker. An essential emphasis of the proposed method is randomization, which is crucial for security and robustness against arbitrary quality-preserving attacks. We formally show that malicious optimal estimation attacks that are specifically derived for our algorithm are ineffective in practice. Furthermore, we experimentally demonstrate that our watermarking method survives many generic benchmark attacks for a large number of images.

[1]  Gregory W. Wornell,et al.  Achievable performance of digital watermarking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[2]  Allen Gersho,et al.  Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.

[3]  Kannan Ramchandran,et al.  Low-complexity image denoising based on statistical modeling of wavelet coefficients , 1999, IEEE Signal Processing Letters.

[4]  Thierry Pun,et al.  Fast Robust Template Matching for Affine Resistant Image Watermarks , 1999, Information Hiding.

[5]  Ramarathnam Venkatesan,et al.  Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics , 2005, IS&T/SPIE Electronic Imaging.

[6]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[7]  Darko Kirovski,et al.  Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..

[8]  Neri Merhav,et al.  On the capacity game of public watermarking systems , 2004, IEEE Transactions on Information Theory.

[9]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[10]  H. Vincent Poor,et al.  An introduction to signal detection and estimation (2nd ed.) , 1994 .

[11]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[12]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.

[13]  Thomas S. Huang,et al.  Image processing , 1971 .

[14]  Ramarathnam Venkatesan,et al.  Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics , 2004, MM&Sec '04.

[15]  S. Pereira,et al.  Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.

[16]  K. Mihcak Ramarathnam Venkatesan,et al.  Watermarking via optimization algorithms for quantizing ran- domized statistics of image regions , 2002 .

[17]  Ramarathnam Venkatesan,et al.  Blind image watermarking via derivation and quantization of robust semi-global statistics , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[18]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[19]  Shlomo Shamai,et al.  Nested linear/Lattice codes for structured multiterminal binning , 2002, IEEE Trans. Inf. Theory.

[20]  Volume Assp,et al.  ACOUSTICS. SPEECH. AND SIGNAL PROCESSING , 1983 .

[21]  Joachim J. Eggers,et al.  Information embedding and digital watermarking as communication with side information , 2001 .

[22]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[23]  P. Moulin,et al.  Information embedding codes matched to locally stationary Gaussian image models , 2002, Proceedings. International Conference on Image Processing.

[24]  Darko Kirovski,et al.  Blind pattern matching attack on watermarking systems , 2003, IEEE Trans. Signal Process..

[25]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[26]  Michael T. Orchard,et al.  Image coding based on mixture modeling of wavelet coefficients and a fast estimation-quantization framework , 1997, Proceedings DCC '97. Data Compression Conference.

[27]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[28]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[29]  Pierre Moulin,et al.  Error exponents for one-bit watermarking , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[30]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[31]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[32]  David L. Neuhoff,et al.  Quantization , 2022, IEEE Trans. Inf. Theory.

[33]  Thierry Pun,et al.  Method for the estimation and recovering from general affine transforms in digital watermarking applications , 2002, IS&T/SPIE Electronic Imaging.

[34]  Ramarathnam Venkatesan,et al.  Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks , 2002, Information Hiding.