Performance analysis of chaotic and white watermarks in the presence of common watermark attacks

Digital watermarking is a technique that aims to embed a piece of information permanently into some digital media, which may be used at a later stage to prove owner authentication and attempt to provide protection to documents. The most common watermark types used to date are pseudorandom number sequences which possess a white spectrum. Chaotic watermark sequences have been receiving increasing interest recently and have been shown to be an alternative to the pseudorandom watermark types. In this paper the performance of pseudorandom watermarks and chaotic watermarks in the presence of common watermark attacks is performed. The chaotic watermarks are generated from the iteration of the skew tent map, the Bernoulli map and the logistic map. The analysis focuses on the watermarked images after they have been subjected to common image distortion attacks. The capacities of each of these images are also calculated. It is shown that signals generated from lowpass chaotic signals have superior performance over the other signal types analysed for the attacks studied.

[1]  Robert L. Devaney,et al.  A First Course In Chaotic Dynamical Systems: Theory And Experiment , 1993 .

[2]  Jessica Fridrich Combining low-frequency and spread-spectrum watermarking , 1998, Optics & Photonics.

[3]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[4]  Ingemar J. Cox,et al.  Watermarking Is Not Cryptography , 2006, IWDW.

[5]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[6]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[7]  Anastasios Tefas,et al.  Statistical analysis of a watermarking system based on Bernoulli chaotic sequences , 2001, Signal Process..

[8]  E. Ott Chaos in Dynamical Systems: Contents , 1993 .

[9]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  Anastasios Tefas,et al.  Markov chaotic sequences for correlation based watermarking schemes , 2003 .

[11]  Ioannis Pitas,et al.  A Comparative Study of Chaotic and White Noise Signals in Digital Watermarking , 2008 .

[12]  Ramarathnam Venkatesan,et al.  Image watermarking with better resilience , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[13]  John G. Keating,et al.  The impact of the theoretical properties of the logistic function on the generation of optically detectable watermarks , 2004, SPIE Security + Defence.

[14]  David Ruelle,et al.  Deterministic chaos: the science and the fiction , 1995 .

[15]  John G. Keating,et al.  Noisy optical detection of chaos-based watermarks , 2004, Photonics North.

[16]  Anastasios Tefas,et al.  Applications of chaotic signal processing techniques to multimedia watermarking , 2000 .

[17]  Jiaoying Shi,et al.  Digital watermarking systems with chaotic sequences , 1999, Electronic Imaging.

[18]  Zhang Hongbin,et al.  Capacity and reliability of digital watermarking , 2004, Proceedings of 2004 International Conference on the Business of Electronic Product Reliability and Liability (IEEE Cat. No.04EX809).

[19]  Mauro Barni,et al.  Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..

[20]  Li Wenbo,et al.  A chaos-based robust wavelet-domain watermarking algorithm , 2004 .

[21]  Huang Daren,et al.  A DWT-based image watermarking algorithm , 2001, IEEE International Conference on Multimedia and Expo, 2001. ICME 2001..

[22]  John G. Keating,et al.  Optical and digital technique for watermark detection , 2003, SPIE Optics + Photonics.

[23]  Anastasios Tefas,et al.  Statistical analysis of Markov chaotic sequences for watermarking applications , 2001, ISCAS 2001. The 2001 IEEE International Symposium on Circuits and Systems (Cat. No.01CH37196).

[24]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[25]  Heung-Kyu Lee,et al.  Geometric attack resistant watermarking in wavelet transform domain. , 2005, Optics express.

[26]  Lei Tian,et al.  A new watermarking method based on chaotic maps , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[27]  John G. Keating,et al.  Generation and detection of watermarks derived from chaotic functions , 2005, SPIE OPTO-Ireland.

[28]  John G. Keating,et al.  A detailed study of the generation of optically detectable watermarks using the logistic map , 2006 .

[29]  D. Ruelle,et al.  The Claude Bernard Lecture, 1989 - Deterministic chaos: the science and the fiction , 1990, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[30]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[31]  Stephen D. Wolthusen,et al.  Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.

[32]  Mohan S. Kankanhalli,et al.  A dual watermarking technique for images , 1999, MULTIMEDIA '99.

[33]  Anastasios Tefas,et al.  Performance analysis of correlation-based watermarking schemes employing Markov chaotic sequences , 2003, IEEE Trans. Signal Process..