Transportation Spherical Watermarking

During the past twenty years, there has been a great interest in the study of spread spectrum (SS) watermarking. However, it is still a challenging task to design a secure and robust SS watermarking method. In this paper, we first define a family of secure SS watermarking methods, named as spherical watermarking (SW). The watermarked correlation of SW is defined to be uniformly distributed on a spherical surface, and this makes SW be key-secure against the watermarked-only attack. Then, we propose an implementation of SW, called transportation SW (TSW), which is designed to decrease embedding distortion in a recursive manner using the transportation theory, meanwhile keeping the security of SW. Moreover, we present a theoretical analysis of the embedding distortion and robustness of the proposed method. Finally, extensive experiments are conducted on simulated signals and real images. The experimental results show that TSW is more robust than existing secure SS watermarking methods.

[1]  Benoit M. Macq,et al.  Comparison of secure spread-spectrum modulations applied to still image watermarking , 2009, Ann. des Télécommunications.

[2]  François Cayre,et al.  Achieving subspace or key security for WOA using natural or circular watermarking , 2006, MM&Sec '06.

[3]  Shu Lin,et al.  Error control coding : fundamentals and applications , 1983 .

[4]  Yuan-Gen Wang,et al.  Recursive optimization of spherical watermarking using transportation theory , 2015, 2015 IEEE International Conference on Image Processing (ICIP).

[5]  Fernando Pérez-González,et al.  Security of spread-spectrum-based data hiding , 2007, Electronic Imaging.

[6]  Jidong Zhong,et al.  An Enhanced Multiplicative Spread Spectrum Watermarking Scheme , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[7]  Harold W. Kuhn,et al.  The Hungarian method for the assignment problem , 1955, 50 Years of Integer Programming.

[8]  L. Kantorovich On a Problem of Monge , 2006 .

[9]  Fernando Pérez-González,et al.  Information-Theoretic Analysis of Security in Side-Informed Data Hiding , 2005, Information Hiding.

[10]  Song Guo,et al.  Spread Spectrum-Based High Embedding Capacity Watermarking Method for Audio Signals , 2015, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[11]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[12]  Sam Kwong,et al.  A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework , 2018, IEEE Transactions on Cybernetics.

[13]  Jian Cao,et al.  Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security , 2012, IEEE Transactions on Information Forensics and Security.

[14]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[15]  Benoit M. Macq,et al.  Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images , 2014, IEEE Transactions on Image Processing.

[16]  S. Kotz,et al.  Symmetric Multivariate and Related Distributions , 1989 .

[17]  Lihong Cui,et al.  Adaptive Multiwavelet-Based Watermarking Through JPW Masking , 2011, IEEE Transactions on Image Processing.

[18]  Fernando Pérez-González,et al.  Spread-Spectrum Watermarking Security , 2009, IEEE Transactions on Information Forensics and Security.

[19]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[20]  M. Knott,et al.  On the optimal mapping of distributions , 1984 .

[21]  G. Simons,et al.  On the theory of elliptically contoured distributions , 1981 .

[22]  I. Miller Probability, Random Variables, and Stochastic Processes , 1966 .

[23]  Benoit M. Macq,et al.  Optimization of natural watermarking using transportation theory , 2009, MM&Sec '09.

[24]  François Cayre,et al.  Natural Watermarking: A Secure Spread Spectrum Technique for WOA , 2006, Information Hiding.

[25]  Teddy Furon,et al.  A Survey of Watermarking Security , 2005, IWDW.

[26]  Pierre Moulin,et al.  The zero-rate spread-spectrum watermarking game , 2003, IEEE Trans. Signal Process..

[27]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[28]  Fernando Pérez-González,et al.  Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding , 2008, Information Hiding.

[29]  Morris L. Eaton,et al.  On the Projections of Isotropic Distributions , 1981 .

[30]  Athanasios Papoulis,et al.  Probability, Random Variables and Stochastic Processes , 1965 .

[31]  Mauro Barni,et al.  A general framework for robust watermarking security , 2003, Signal Process..

[32]  I. Daubechies,et al.  Biorthogonal bases of compactly supported wavelets , 1992 .

[33]  Jing-Ming Guo,et al.  High Capacity Data Hiding for Error-Diffused Block Truncation Coding , 2012, IEEE Transactions on Image Processing.

[34]  Mauro Barni,et al.  Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..

[35]  François Cayre,et al.  Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.

[36]  Arthur Cayley,et al.  The Collected Mathematical Papers: On Monge's “Mémoire sur la théorie des déblais et des remblais” , 2009 .