Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime

The problem of optimum watermark embedding and detection was addressed in a recent paper by Merhav and Sabbag, where the optimality criterion was the maximum false-negative error exponent subject to a guaranteed false-positive error exponent. In particular, Merhav and Sabbag derived universal asymptotically optimum embedding and detection rules under the assumption that the detector relies solely on second-order joint empirical statistics of the received signal and the watermark. In the case of a Gaussian host signal and a Gaussian attack, however, closed-form expressions for the optimum embedding strategy and the false-negative error exponent were not obtained in that work. In this paper, we derive the false-negative error exponent for any given embedding strategy and use such a result to show that in general the optimum embedding rule depends on the variance of the host sequence and the variance of the attack noise. We then focus on high signal-to-noise ratio (SNR) regime, deriving the optimum embedding strategy for such a setup. In this case, a universally optimum embedding rule turns out to exist and to be very simple with an intuitively appealing geometrical interpretation. The effectiveness of the newly proposed embedding strategy is evaluated numerically.

[1]  M. Barni,et al.  Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding , 2005, IEEE Transactions on Signal Processing.

[2]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[3]  Ingemar J. Cox,et al.  Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[4]  Teddy Furon,et al.  Broken Arrows , 2008, EURASIP J. Inf. Secur..

[5]  Ali N. Akansu,et al.  Signaling methods for multimedia steganography , 2004, IEEE Transactions on Signal Processing.

[6]  M. Barni,et al.  Informed watermarking by means of orthogonal and pseudo-random dirty paper coding , 2005 .

[7]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[8]  Mauro Barni,et al.  A general framework for robust watermarking security , 2003, Signal Process..

[9]  Russell M. Mersereau,et al.  A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance , 2007, IEEE Transactions on Information Forensics and Security.

[10]  Bo Zhang,et al.  Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks , 2007, IEEE Transactions on Information Forensics and Security.

[11]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[12]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[13]  Mauro Barni,et al.  Effectiveness of exhaustive search and template matching against watermark desynchronization , 2005, IEEE Signal Processing Letters.

[14]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[15]  Benoit M. Macq,et al.  JANIS: Just Another n-order Side-Informed Watermarking Scheme , 2002, Proceedings. International Conference on Image Processing.

[16]  Pedro Comesaña Alfaro,et al.  Detection in quantization-based watermarking: performance and security issues , 2005, IS&T/SPIE Electronic Imaging.

[17]  Mauro Barni,et al.  Expanding the class of watermark de-synchronization attacks , 2007, MM&Sec.

[18]  Fernando Pérez-González,et al.  Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..

[19]  C. Mosquera,et al.  Rational dither modulation: a high-rate data-hiding method invariant to gain attacks , 2005, IEEE Transactions on Signal Processing.

[20]  Wenjun Zeng,et al.  Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Transactions on Information Forensics and Security.

[21]  Pierre Moulin,et al.  Error exponents for one-bit watermarking , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[22]  Teddy Furon,et al.  Some theoretical aspects of watermarking detection , 2006, Electronic Imaging.

[23]  H. Vincent Poor,et al.  An introduction to signal detection and estimation (2nd ed.) , 1994 .

[24]  Mauro Barni,et al.  A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..

[25]  Teddy Furon,et al.  A Constructive and Unifying Framework for Zero-Bit Watermarking , 2006, IEEE Transactions on Information Forensics and Security.

[26]  Neri Merhav,et al.  Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Transactions on Information Theory.

[27]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[28]  Roderick Wong,et al.  Asymptotic approximations of integrals , 1989, Classics in applied mathematics.