Quantization index modulation: A class of provably good methods for digital watermarking and information embedding

We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third, "composite" signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing the information-embedding rate, minimizing the distortion between the host signal and composite signal, and maximizing the robustness of the embedding. We introduce new classes of embedding methods, termed quantization index modulation (QIM) and distortion-compensated QIM (DC-QIM), and develop convenient realizations in the form of what we refer to as dither modulation. Using deterministic models to evaluate digital watermarking methods, we show that QIM is "provably good" against arbitrary bounded and fully informed attacks, which arise in several copyright applications, and in particular it achieves provably better rate distortion-robustness tradeoffs than currently popular spread-spectrum and low-bit(s) modulation methods. Furthermore, we show that for some important classes of probabilistic models, DC-QIM is optimal (capacity-achieving) and regular QIM is near-optimal. These include both additive white Gaussian noise (AWGN) channels, which may be good models for hybrid transmission applications such as digital audio broadcasting, and mean-square-error-constrained attack channels that model private-key watermarking applications.

[1]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[2]  Jean-Paul M. G. Linnartz,et al.  Detecting electronic watermarks in digital video , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[3]  Meir Feder,et al.  On lattice quantization noise , 1996, IEEE Trans. Inf. Theory.

[4]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[5]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[6]  Jerry D. Gibson,et al.  Digital coding of waveforms: Principles and applications to speech and video , 1985, Proceedings of the IEEE.

[7]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[8]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[9]  Haralabos C. Papadopoulos,et al.  Simultaneous broadcasting of analog FM and digital audio signals by means of adaptive precanceling techniques , 1998, IEEE Trans. Commun..

[10]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[11]  Feng-Wen Sun,et al.  Approaching capacity by equiprobable signaling on the Gaussian channel , 1993, IEEE Trans. Inf. Theory.

[12]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[13]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[14]  Abbas El Gamal,et al.  On the capacity of computer memory with defects , 1983, IEEE Trans. Inf. Theory.

[15]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[16]  Ahmed H. Tewfik,et al.  Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.

[17]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[18]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[19]  Gregory W. Wornell,et al.  Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia , 2001, J. VLSI Signal Process..

[20]  John G. Proakis,et al.  Digital Communications , 1983 .

[21]  Fernando Pérez-González,et al.  Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images , 1998, IEEE J. Sel. Areas Commun..

[22]  Amos Lapidoth,et al.  Nearest neighbor decoding for additive non-Gaussian noise channels , 1996, IEEE Trans. Inf. Theory.

[23]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[24]  B. Chen,et al.  Broadcasting data in the FM band by means of adaptive contiguous band insertion and precancelling techniques , 1999, 1999 IEEE International Conference on Communications (Cat. No. 99CH36311).

[25]  Neri Merhav On random coding error exponents of watermarking systems , 2000, IEEE Trans. Inf. Theory.

[26]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[27]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[28]  A. Tirkel,et al.  Electronic water mark , 1993 .

[29]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.

[30]  J.A. O'Sullivan,et al.  Information theoretic analysis of steganography , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[31]  Gregory W. Wornell,et al.  The duality between information embedding and source coding with side information and some applications , 2003, IEEE Trans. Inf. Theory.

[32]  Brian Chen Digital watermarking, information embedding, and data hiding systems , 2000 .