Dither modulation: a new approach to digital watermarking and information embedding

被引:56
作者
Chen, B [1 ]
Wornell, GW [1 ]
机构
[1] MIT, Elect Res Lab, Cambridge, MA 02139 USA
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS | 1999年 / 3657卷
关键词
dither modulation; quantization index modulation; information embedding; digital watermarking; steganography; data hiding;
D O I
10.1117/12.344684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third, "composite" signal. The embedding must be done in such a way that minimizes distortion between the host signal and composite signal, maximizes the information-embedding rate, and maximizes the robustness of the embedding. In general, these three goals are conflicting, and the embedding process must be designed to efficiently trade-off the three quantities. We propose a new class of embedding methods, which we term quantization index modulation (QIM), and develop a convenient realization of a QIM system that we call dither modulation in which the embedded information modulates a dither signal and the host signal is quantized with an associated dithered quantizer. QIM and dither modulation systems have considerable performance advantages over previously proposed spread-spectrum and low-bit(s) modulation systems in terms of the achievable performance trade-offs among distortion, rate, and robustness of the embedding. We also demonstrate these performance advantages in the context of "no-key" digital watermarking applications, in which attackers can access watermarks in the clear. We also examine the fundamental limits of digital watermarking from an information theoretic perspective and discuss the achievable limits of QIM and alternative systems.
引用
收藏
页码:342 / 353
页数:2
相关论文
共 12 条
[1]  
[Anonymous], 1994, DIGITAL COMMUNICATIO
[2]  
Barton J. M., 1997, United States Patent, Patent No. [5646997, US5646997A]
[3]  
Chen B., 1998, P IEEE WORKSH MULT S
[4]  
CHEN B, DITHER MODULATION QU
[5]  
CHEN B, SYSTEM METHOD PRODUC
[6]  
Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
[7]   Some general methods for tampering with watermarks [J].
Cox, IJ ;
Linnartz, JPMG .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :587-593
[8]  
Jayant N. S., 1984, DIGITAL CODING WAVEF
[9]   Nearest neighbor decoding for additive non-Gaussian noise channels [J].
Lapidoth, A .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1996, 42 (05) :1520-1529
[10]   Multimedia data-embedding and watermarking technologies [J].
Swanson, MD ;
Kobayashi, M ;
Tewfik, AH .
PROCEEDINGS OF THE IEEE, 1998, 86 (06) :1064-1087