Double-Sided Watermark Embedding and Detection

Spread-spectrum schemes embed additive or multiplicative watermarks into the host contents for copyright protection. However, their performances are reduced by the interference from the host contents. Thus, in this work, we introduce a simple double-sided technique to utilize this interference for performance improvements. Different from the previous host interference rejection schemes, it does not reject the host interference. However, it can also achieve great performance enhancement over the traditional spread-spectrum schemes. Moreover, due to this nice property of not rejecting the host interference, it has a big advantage over the host interference rejection schemes in that the perceptual analysis can be easily implemented for our scheme to improve the perceptual quality of the watermarked contents. Our technique is effectively employed in both additive and multiplicative spread-spectrum schemes. Finally, its performance advantage is demonstrated through both theoretical and empirical comparisons.

[1]  Ioannis Pitas,et al.  Asymptotically optimal detection for additive watermarking in the DCT and DWT domains , 2003, IEEE Trans. Image Process..

[2]  Michael G. Strintzis,et al.  Locally optimum nonlinearities for DCT watermark detection , 2004, IEEE Transactions on Image Processing.

[3]  Pierre Moulin,et al.  Error exponents for one-bit watermarking , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[4]  Mauro Barni,et al.  A DCT-domain system for robust image watermarking , 1998, Signal Process..

[5]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[6]  Andrew B. Watson,et al.  DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.

[7]  Jidong Zhong,et al.  Double Sided Watermark Embedding and Detection with Perceptual Analysis , 2007, ArXiv.

[8]  Brian Chen Digital watermarking, information embedding, and data hiding systems , 2000 .

[9]  Andrew B. Watson,et al.  Visually optimal DCT quantization matrices for individual images , 1993, [Proceedings] DCC `93: Data Compression Conference.

[10]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[11]  Oscar C. Au,et al.  Novel blind multiple watermarking technique for images , 2003, IEEE Trans. Circuits Syst. Video Technol..

[12]  Jidong Zhong,et al.  An Enhanced Multiplicative Spread Spectrum Watermarking Scheme , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Fernando Pérez-González,et al.  An accurate analysis of scalar quantization-based data hiding , 2006, IEEE Transactions on Information Forensics and Security.

[14]  Teddy Furon,et al.  Some theoretical aspects of watermarking detection , 2006, Electronic Imaging.

[15]  Bo Zhang,et al.  Robust Detection of Transform Domain Additive Watermarks , 2005, IWDW.

[16]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[17]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[18]  Wenjun Zeng,et al.  A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images , 1999, IEEE Trans. Image Process..

[19]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[20]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[21]  A. Gualtierotti H. L. Van Trees, Detection, Estimation, and Modulation Theory, , 1976 .

[22]  Neri Merhav,et al.  Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Transactions on Information Theory.

[23]  Jean-Paul M. G. Linnartz,et al.  Optimal detection of multiplicative watermarks , 2000, 2000 10th European Signal Processing Conference.

[24]  Pedro Comesaña Alfaro,et al.  Detection in quantization-based watermarking: performance and security issues , 2005, IS&T/SPIE Electronic Imaging.

[25]  Patrick M. Fitzpatrick Advanced Calculus: A Course in Mathematical Analysis , 1995 .

[26]  Fernando Pérez-González,et al.  Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..

[27]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[28]  Neil J. Hurley,et al.  Improved polynomial detectors for side-informed watermarking , 2003, IS&T/SPIE Electronic Imaging.

[29]  Thomas S. Huang,et al.  Robust optimum detection of transform domain multiplicative watermarks , 2003, IEEE Trans. Signal Process..

[30]  Ingemar J. Cox,et al.  Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.

[31]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[32]  Bernd Girod,et al.  Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[33]  Mauro Barni,et al.  A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..

[34]  F. Muller Distribution shape of two-dimensional DCT coefficients of natural images , 1993 .

[35]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.