Preprocessed and postprocessed quantization index modulation methods for digital watermarking

被引:43
作者
Chen, B [1 ]
Wornell, GW [1 ]
机构
[1] MIT, Elect Res Lab, Cambridge, MA 02139 USA
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II | 2000年 / 3971卷
关键词
digital watermarking; dither modulation; quantization index modulation; distortion compensation; capacity; information embedding; data hiding; steganography;
D O I
10.1117/12.384995
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Quantization index modulation (QIM) methods, a class of digital watermarking and information embedding methods, achieve very efficient trade-offs among the amount of embedded information (rate), the amount of embedding-induced distortion to the host signal, and the robustness to intentional and unintentional attacks. For example, we show that against independent additive Gaussian attacks, which are good models for at least some types of uninformed and unintentional attacks, QIM methods exist that achieve the best possible rate-distortion-robustness trade-offs (i.e., capacity) asymptotically at high rates and achieve performance within a few dB of capacity at ail finite rates. Furthermore, low-complexity realizations of QIM methods, such as so-called dither modulation, have also been shown to achieve favorable rate-distortion-robustness trade-offs. We further develop preprocessing and postprocessing techniques that enable QIM to fully achieve capacity, not only against Gaussian attacks but also against other types of attacks as well. One practical postprocessing technique we develop we refer to as distortion compensation. Distortion compensation has the property that when suitably optimized it is sufficient for use in conjunction with QIM to achieve capacity against Gaussian attacks and against square-error distortion-constrained attacks. More generally, we present the results of a comparative information theoretic analysis of the fundamental performance limits of QIM, distortion-compensated QIM, and other watermarking methods and demonstrate practically achievable gains with experimental results.
引用
收藏
页码:48 / 59
页数:12
相关论文
共 19 条
  • [1] [Anonymous], P IEEE INT C IM PROC
  • [2] [Anonymous], 1994, DIGITAL COMMUNICATIO
  • [3] Dither modulation: a new approach to digital watermarking and information embedding
    Chen, B
    Wornell, GW
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 : 342 - 353
  • [4] Provably robust digital watermarking
    Chen, B
    Wornell, GW
    [J]. MULTIMEDIA SYSTEMS AND APPLICATIONS II, 1999, 3845 : 43 - 54
  • [5] CHEN B, 2000, IN PRESS J VLSI SIGN
  • [6] CHEN B, 1999, UNPUB IEEE T INFORMA
  • [7] WRITING ON DIRTY PAPER
    COSTA, MHM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (03) : 439 - 441
  • [8] Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
  • [9] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [10] Watermarking as communications with side information
    Cox, IJ
    Miller, ML
    McKellips, AL
    [J]. PROCEEDINGS OF THE IEEE, 1999, 87 (07) : 1127 - 1141