Analysis of digital watermarks subjected to optimum linear filtering and additive noise

被引:20
作者
Su, JK [1 ]
Eggers, JJ [1 ]
Girod, B [1 ]
机构
[1] MIT, Lincoln Lab, Lexington, MA 02420 USA
关键词
digital watermarking; attacks on digital watermarks; capacity and robustness of digital watermarks; information theory;
D O I
10.1016/S0165-1684(01)00038-X
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Using a theoretical approach based on random processes, signal processing, and information theory. we study the performance of digital watermarks subjected to an attack consisting of linear shift-invariant filtering and additive colored Gaussian noise. Watermarking is viewed as communication over a hostile channel, where the attack takes place. The attacker attempts to minimize the channel capacity under a constraint on the attack distortion (distortion of the attacked signal), and the owner attempts to maximize the capacity under a constraint on the embedding distortion (distortion of the watermarked signal). The distortion measure is frequency-weighted mean-squared error (MSE). In a conventional additive-noise channel, communication is most difficult when the noise is white and Gaussian, so we first investigate an effective white-noise attack based on this principle, We then consider the problem of resisting this attack and show that capacity is maximized when a power-spectrum condition (PSC) is fulfilled. The PSC states that the power spectrum of the watermark should be directly proportional to that of the original signal. However, unlike a conventional channel, the hostile attack channel adapts to the watermark, not vice versa. Hence, the effective white-noise attack is suboptimal, We derive the optimum attack. which minimizes the channel capacity for a given attack distortion. The attack can be roughly characterized by a rule-of-thumb: At low attack distortions, it adds noise, and at high attack distortions. it discards frequency components. Against the optimum attack, the PSC does not maximize capacity at all attack distortions. Also, there is no unique watermark power spectrum that maximizes capacity over the entire range of attack distortions. To find the watermark power spectrum that maximizes capacity against the optimum attack, we apply iterative numerical methods, which alternately adjust the watermark power spectrum and re-optimize the parameters of the optimum attack. Experiments using ordinary MSE distortion lead to a rule-of-thumb: White watermarks perform nearly optimally at low attack distortions, while PSC-compliant watermarks perform nearly optimally at high attack distortions. The effect of interference from the original signal in suboptimal blind watermarking schemes is also considered; experiments examine its influence on the optimized watermark power spectra and the potential increase in capacity when it can be partially suppressed. Additional experiments demonstrate the importance of memory. and compare the optimum attack with suboptimal attack models. Finally, the rule-of-thumb for the defense is extended to the case of frequency-weighted MSE as a distortion measure. (C) 2001 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:1141 / 1175
页数:35
相关论文
共 50 条
[1]   Geometric distortions correction in image watermarking [J].
Alghoniemy, M ;
Tewfik, AH .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :82-89
[2]  
[Anonymous], THESIS NEW JERSEY I
[3]  
[Anonymous], 1987, SIMULATED ANNEALING
[4]   Automatic recovery of invisible image watermarks from geometrically distorted images [J].
Braudaway, GW ;
Mintzer, F .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :74-81
[5]   Preprocessed and postprocessed quantization index modulation methods for digital watermarking [J].
Chen, B ;
Wornell, GW .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :48-59
[6]   Dither modulation: a new approach to digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :342-353
[7]   Provably robust digital watermarking [J].
Chen, B ;
Wornell, GW .
MULTIMEDIA SYSTEMS AND APPLICATIONS II, 1999, 3845 :43-54
[8]   A robust optimization solution to the data hiding problem using distributed source coding principles [J].
Chou, J ;
Pradhan, S ;
El Ghaoui, L ;
Ramchandran, K .
IMAGE AND VIDEO COMMUNICATIONS AND PROCESSING 2000, 2000, 3974 :270-279
[9]  
CHOU J, 1999, P 33 AS C SIGN SYST, V2, P1503
[10]   WRITING ON DIRTY PAPER [J].
COSTA, MHM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (03) :439-441