A novel approach to decoding: Exploiting anticipated attack information using genetic programming

In a watermarking system, the decoder structures are mostly fixed. They do not account for the normal processing or intentional attacks. In the present work, a method of automatically modifying the decoder structure in accordance to the given cover image and conceivable attack is illustrated. The proposed Genetic Programming based watermark decoding scheme is a blind one. It exploits the search space regarding types of dependencies of the decoder on different factors. Especially, information pertaining to watermarked cover coefficients is utilized to reduce host interference, while the conceivable-attack information is utilized to circumvent the anticipated distortion. The actual performance of the genetic decoder is assessed through experiments, which justify the use of intelligent search techniques in signal detection/decoding. Simulation results show that the resultant genetic decoder has superior performance as compared to the conventional decoder against the attacks of Checkmark benchmark.

[1]  Asifullah Khan,et al.  Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding , 2007, Inf. Fusion.

[2]  Zhou Wang,et al.  Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .

[3]  Asifullah Khan,et al.  Combination and optimization of classifiers in gender classification using genetic programming , 2005 .

[4]  Asifullah Khan,et al.  Intelligent perceptual shaping of a digital watermark: Exploiting Characteristics of human visual system , 2006, Int. J. Knowl. Based Intell. Eng. Syst..

[5]  Ioannis Pitas,et al.  Optimal detector structure for DCT and subband domain watermarking , 2002, Proceedings. International Conference on Image Processing.

[6]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[7]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[8]  Tapio Seppänen,et al.  Increasing robustness of an audio watermark using turbo codes , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[9]  S. Pereira,et al.  Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.

[10]  Pao-Ta Yu,et al.  Digital watermarking based on neural networks for color images , 2001, Signal Process..

[11]  Hongtao Lu,et al.  Optimal Watermark Detection Based on Support Vector Machines , 2004, ISNN.

[12]  Jeng-Shyang Pan,et al.  Genetic watermarking based on transform-domain techniques , 2004, Pattern Recognit..

[13]  Panagiotis Tsakalides,et al.  Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models , 2005, IEEE Transactions on Multimedia.

[14]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[15]  Ingemar J. Cox,et al.  Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[16]  Thierry Pun,et al.  Secure hybrid robust watermarking resistant against tampering and copy attack , 2003, Signal Process..

[17]  Mauro Barni,et al.  A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..

[18]  Pierre Moulin,et al.  Design and statistical analysis of a hash-aided image watermarking system , 2004, IEEE Transactions on Image Processing.

[19]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[20]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[21]  Michael G. Strintzis,et al.  Locally optimum nonlinearities for DCT watermark detection , 2004, IEEE Transactions on Image Processing.

[22]  Jonas S. Almeida,et al.  Dynamic maximum tree depth: a simple technique for avoiding bloat in tree-based GP , 2003 .

[23]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[24]  Pierre Moulin,et al.  A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..

[25]  B. Girod,et al.  A blind watermarking scheme based on structured codebooks , 2000 .

[26]  Peter Nordin,et al.  Genetic programming - An Introduction: On the Automatic Evolution of Computer Programs and Its Applications , 1998 .

[27]  John R. Koza,et al.  Genetic Programming IV: Routine Human-Competitive Machine Intelligence , 2003 .