Digital Watermarking

This paper reviews recent research on information-theoretic aspects of information hiding. Emphasis is placed on applications requiring high payload (e.g., covert communications). Information hiding may be viewed as a game between two teams (embedder/decoder vs. attacker), and optimal information-embedding and attack strategies may be developed in this context. This paper focuses on several such strategies, including a framework for developing near-optimal codes and universal decoders. The suboptimality of spread-spectrum strategies follows from the analysis. The theory is applied to image watermarking examples.

[1]  Jeng-Shyang Pan,et al.  VQ-based digital image watermarking method , 2000 .

[2]  Guillermo Sapiro,et al.  Geometric Partial Differential Equations and Image Analysis: Introduction , 2001 .

[3]  Jeng-Shyang Pan,et al.  An Introduction to Watermarking Techniques , 2004 .

[4]  Ingemar J. Cox,et al.  A Review of of Watermarking Principles and Practices , 1999 .

[5]  D. Mumford,et al.  Stochastic models for generic images , 2001 .

[6]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[7]  Juan R. Hern,et al.  Statistical Analysis of Watermarking Schemes for Copyright Protection of Images , 1999 .

[8]  R. Gray,et al.  Vector quantization , 1984, IEEE ASSP Magazine.

[9]  Thomas S. Huang,et al.  Blind digital watermarking for images and videos and performance analysis , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[10]  Eero P. Simoncelli,et al.  A Parametric Texture Model Based on Joint Statistics of Complex Wavelet Coefficients , 2000, International Journal of Computer Vision.

[11]  Bernd Girod,et al.  Quantization effects on digital watermarks , 2001, Signal Process..

[12]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[13]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[14]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[15]  Jeng-Shyang Pan,et al.  Efficient and robust watermarking algorithm with vector quantisation , 2001 .

[16]  D. Field,et al.  Natural image statistics and efficient coding. , 1996, Network.

[17]  Sheng-He Sun,et al.  Digital image watermarking technique based on vector quantisation , 2000 .

[18]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[19]  Sung-Hwan Jung,et al.  A study on the robustness of watermark according to frequency band , 2001, ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).

[20]  Bernd Girod,et al.  Channel model for a watermark attack , 1999, Electronic Imaging.

[21]  D. Ruderman The statistics of natural images , 1994 .

[22]  I. Pitas,et al.  The use of watermarks in the protection of digital multimedia products , 1999, Proc. IEEE.

[23]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[24]  David J. Field,et al.  Emergence of simple-cell receptive field properties by learning a sparse code for natural images , 1996, Nature.

[25]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[26]  Ton Kalker,et al.  Digital Watermarking for DVD Video Copy Protection What Issues Play a Role in Designing an Effective System ? , 2000 .

[27]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[28]  Ton Kalker,et al.  Digital watermarking for DVD video copy protection , 2000 .

[29]  Martin Kutter Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation , 1999, Information Hiding.

[30]  Edward J. Delp,et al.  Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..

[31]  Alex M. Andrew,et al.  Level Set Methods and Fast Marching Methods: Evolving Interfaces in Computational Geometry, Fluid Mechanics, Computer Vision, and Materials Science (2nd edition) , 2000 .

[32]  Iwan Setyawan,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000 .

[33]  Jeng-Shyang Pan,et al.  A VQ-based robust multi-watermarking algorithm , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..

[34]  Fernando Pérez-González,et al.  Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images , 1998, IEEE J. Sel. Areas Commun..

[35]  Eero P. Simoncelli,et al.  Natural image statistics and neural representation. , 2001, Annual review of neuroscience.

[36]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.