Provably robust digital watermarking

被引:46
作者
Chen, B [1 ]
Wornell, GW [1 ]
机构
[1] MIT, Elect Res Lab, Cambridge, MA 02139 USA
来源
MULTIMEDIA SYSTEMS AND APPLICATIONS II | 1999年 / 3845卷
关键词
digital watermarking; dither modulation; quantization index modulation; capacity; spread transform; information embedding;
D O I
10.1117/12.371232
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Copyright notification and enforcement, authentication, covert communication, and hybrid transmission are examples of emerging multimedia applications for digital watermarking methods, methods for embedding one signal (e.g., the digital watermark) within another "host" signal to form a third, "composite" signal. The embedding; is designed to achieve efficient trade-offs among the three conflicting goals of maximizing information-embedding rate, minimizing distortion between the host signal and composite signal, and maximizing the robustness of the embedding. Quantization index modulation (QIM) methods are a class of watermarking methods that achieve provably good rate-distortion-robustness performance. Indeed, QIM methods exist that achieve performance within a few dB of capacity in the case of a (possibly colored) Gaussian host signal and an additive (possibly colored) Gaussian noise channel. Also, QIM methods can achieve capacity with a type of postprocessing called distortion compensation. This capacity is independent of host signal statistics, and thus, contrary to popular belief, the information-embedding capacity when the host signal is not available at the decoder is the same as the case when the host signal is available at the decoder. A low-complexity realization of QIM called dither modulation has previously been proven to be better than both linear methods of spread spectrum and nonlinear methods of low-bit(s) modulation against square-error distortion-constrained intentional attacks. We introduce a new form of dither modulation called spread-transform dither modulation that retains these favorable performance characteristics while achieving better performance against other attacks such as JPEG compression.
引用
收藏
页码:43 / 54
页数:12
相关论文
共 18 条
  • [1] [Anonymous], 1994, DIGITAL COMMUNICATIO
  • [2] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [3] Dither modulation: a new approach to digital watermarking and information embedding
    Chen, B
    Wornell, GW
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 : 342 - 353
  • [4] CHEN B, 1999, UNPUB IEEE T INF THE
  • [5] CHEN B, 1999, UNPUB J VLSI SIGNAL
  • [6] CHEN B, SYSTEM METHOD PRODUC
  • [7] WRITING ON DIRTY PAPER
    COSTA, MHM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (03) : 439 - 441
  • [8] Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
  • [9] Cox I. J., 1996, Information Hiding. First International Workshop Proceedings, P185
  • [10] Some general methods for tampering with watermarks
    Cox, IJ
    Linnartz, JPMG
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) : 587 - 593