Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks

The problem of optimum watermark embedding and detection was addressed in a recent paper by Merhav and Sabbag, where the optimality criterion was the maximum false‐negative error exponent subject to a guaranteed false‐ positive error exponent. In particular, Merhav and Sabbag derived universal asymptotically optimum embedding and detection rules under the assumption that the detector reli es solely on second order joint empirical statistics of the received signal and the watermark. In the case of a Gaussian host signal and a Gaussian attack, however, closed‐form expressions for the optimum embedding strategy and the false‐negative error exponent were not obtained in that work. In this paper, we derive such expressions, again, under the universality assumption that neither the host variance nor the attack power are known to either the embedder or the detector. The optimum embedding rule turns out to be very simple and with an intuitively‐appealing geometrical interpretation. The improvement with respect to existing sub‐optimum schemes is demonstrated by displaying the optimum false‐negative error exponent as a function of the guaranteed false‐positive error exponent.

[1]  Mauro Barni,et al.  A general framework for robust watermarking security , 2003, Signal Process..

[2]  Mauro Barni,et al.  Effectiveness of exhaustive search and template matching against watermark desynchronization , 2005, IEEE Signal Processing Letters.

[3]  Bo Zhang,et al.  Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks , 2007, IEEE Transactions on Information Forensics and Security.

[4]  Neri Merhav,et al.  Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Transactions on Information Theory.

[5]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[6]  Neri Merhav,et al.  Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Trans. Inf. Theory.

[7]  G. Wornell,et al.  Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[8]  Russell M. Mersereau,et al.  A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance , 2007, IEEE Transactions on Information Forensics and Security.

[9]  Mauro Barni,et al.  A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..

[10]  Wenjun Zeng,et al.  Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Transactions on Information Forensics and Security.

[11]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[12]  Roderick Wong,et al.  Asymptotic approximations of integrals , 1989, Classics in applied mathematics.

[13]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[14]  H. Vincent Poor,et al.  An introduction to signal detection and estimation (2nd ed.) , 1994 .

[15]  Ingemar J. Cox,et al.  Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[16]  Benoit M. Macq,et al.  JANIS: Just Another n-order Side-Informed Watermarking Scheme , 2002, Proceedings. International Conference on Image Processing.

[17]  Fernando Pérez-González,et al.  Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..

[18]  Mauro Barni,et al.  Expanding the class of watermark de-synchronization attacks , 2007, MM&Sec.

[19]  Ali N. Akansu,et al.  Signaling methods for multimedia steganography , 2004, IEEE Transactions on Signal Processing.

[20]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[21]  Mauro Barni,et al.  Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding , 2005, IEEE Transactions on Signal Processing.

[22]  Teddy Furon,et al.  A Constructive and Unifying Framework for Zero-Bit Watermarking , 2006, IEEE Transactions on Information Forensics and Security.

[23]  Russell M. Mersereau,et al.  A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance , 2007, IEEE Trans. Inf. Forensics Secur..

[24]  C. Mosquera,et al.  Rational dither modulation: a high-rate data-hiding method invariant to gain attacks , 2005, IEEE Transactions on Signal Processing.

[25]  Wei Liu,et al.  Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Trans. Inf. Forensics Secur..

[26]  Pierre Moulin,et al.  Error exponents for one-bit watermarking , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..