Practical watermarking scheme based on wide spread spectrum and game theory

In this paper, we consider the implementation of robust watermarking scheme for non-i.i.d. Gaussian signals and distortion based on perceptual metrics. We consider this problem as a communication problem and formulated it as a game between an attacker and an embedder in order to establish its theoretical performance. We first show that known parallel Gaussian channels technique does not lead to valid practical implementation, and then propose a new scheme based on Wide Spread Spectrum and Side Information. Theoretical performances of this scheme are established and shown to be very close to the upper bound on capacity defined by Parallel Gaussian channels. Practical implementation of this scheme is then presented and influence of the different parameters on performance is discussed. Finally, experimental results for image watermarking are presented and validate the proposed scheme.

[1]  Ingemar J. Cox,et al.  Dirty-paper trellis codes for watermarking , 2002, Proceedings. International Conference on Image Processing.

[2]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[3]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[4]  Ahmed H. Tewfik,et al.  Robust audio watermarking using perceptual masking , 1998, Signal Process..

[5]  Pierre Moulin,et al.  The Watermark Selection Game , 2001 .

[6]  Andrew B. Watson,et al.  DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.

[7]  Kannan Ramchandran,et al.  Robust optimization solution to the data hiding problem using distributed source coding principles , 2000, Electronic Imaging.

[8]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[9]  Pierre Moulin,et al.  The Data-Hiding Capacity of Image Sources , 2000 .

[10]  Bernd Girod,et al.  Performance of a practical blind watermarking scheme , 2001, IS&T/SPIE Electronic Imaging.

[11]  Bernd Girod,et al.  Estimation of amplitude modifications before SCS watermark detection , 2002, IS&T/SPIE Electronic Imaging.

[12]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[13]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[14]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[15]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[16]  Ross J. Anderson,et al.  Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[17]  P. Moulin,et al.  Information embedding codes matched to locally stationary Gaussian image models , 2002, Proceedings. International Conference on Image Processing.

[18]  Kannan Ramchandran,et al.  Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[19]  Bernd Girod,et al.  Analysis of digital watermarks subjected to optimum linear filtering and additive noise , 2001, Signal Process..

[20]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[21]  Fernando Pérez-González,et al.  Improving data hiding performance by using quantization in a projected domain , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[22]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.

[23]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[24]  Kannan Ramchandran,et al.  Turbo-coded trellis-based constructions for data hiding , 2002, IS&T/SPIE Electronic Imaging.

[25]  Pierre Moulin,et al.  A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..

[26]  B. Girod,et al.  A blind watermarking scheme based on structured codebooks , 2000 .

[27]  Bernd Girod,et al.  Digital Watermarking facing Attacks by Amplitude Scaling and Additive White Noise , 2002 .

[28]  Christine Guillemot,et al.  Information-theoretic resolution of perceptual WSS watermarking of non i.i.d Gaussian signals , 2002, 2002 11th European Signal Processing Conference.

[29]  Christine Guillemot,et al.  Perceptual watermarking of non i.i.d. signals based on wide spread spectrum using side information , 2002, Proceedings. International Conference on Image Processing.