Secure Client-Side ST-DM Watermark Embedding

Client-side watermark embedding systems have been proposed as a possible solution for the copyright protection in large-scale content distribution environments. In this framework, we propose a new look-up-table-based secure client-side embedding scheme properly designed for the spread transform dither modulation watermarking method. A theoretical analysis of the detector performance under the most known attack models is presented and the agreement between theoretical and experimental results verified through several simulations. The experimental results also prove that the advantages of the informed embedding technique in comparison to the spread-spectrum watermarking approach, which are well known in the classical embedding schemes, are preserved in the client-side scenario. The proposed approach permits us to successfully combine the security of client-side embedding with the robustness of informed embedding methods.

[1]  Stefan Katzenbeisser,et al.  Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[2]  Alan C. Bovik,et al.  Image information and visual quality , 2006, IEEE Trans. Image Process..

[3]  Mauro Barni,et al.  Watermarking Systems Engineering (Signal Processing and Communications, 21) , 2004 .

[4]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[5]  Min Wu,et al.  Exploring QIM-based anti-collusion fingerprinting for multimedia , 2006, Electronic Imaging.

[6]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[7]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[8]  K. Ramchandran,et al.  Distributed source coding using syndromes (DISCUS): design and construction , 1999, Proceedings DCC'99 Data Compression Conference (Cat. No. PR00096).

[9]  Ingemar J. Cox,et al.  Facilitating Watermark Insertion by Preprocessing Media , 2004, EURASIP J. Adv. Signal Process..

[10]  Fernando Pérez-González,et al.  Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..

[11]  Franco Frattolillo,et al.  Watermarking Protocol for Web Context , 2007, IEEE Transactions on Information Forensics and Security.

[12]  Ahmad-Reza Sadeghi,et al.  Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages , 2006, ACISP.

[13]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[14]  Bruno O. Shubert,et al.  Random variables and stochastic processes , 1979 .

[15]  Charalampos Manifavas,et al.  Chameleon - A New Kind of Stream Cipher , 1997, FSE.

[16]  Pedro Comesaña Alfaro,et al.  Detection in quantization-based watermarking: performance and security issues , 2005, IS&T/SPIE Electronic Imaging.

[17]  Stefan Katzenbeisser,et al.  Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks , 2008, IEEE Transactions on Information Forensics and Security.

[18]  Aarnout Brombacher,et al.  Probability... , 2009, Qual. Reliab. Eng. Int..

[19]  Bernd Girod,et al.  Informed Watermarking , 2002 .

[20]  Athanasios Papoulis,et al.  Probability, Random Variables and Stochastic Processes , 1965 .

[21]  Min Wu,et al.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.

[22]  V. Ralph Algazi,et al.  Objective picture quality scale (PQS) for image coding , 1998, IEEE Trans. Commun..

[23]  Stefan Katzenbeisser,et al.  A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[24]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[25]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[26]  Kannan Ramchandran,et al.  Watermarking based on duality with distributed source coding and robust optimization principles , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[27]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).