Improved Robust Watermarking Based on Rational Dither Modulation (original) (raw)
Related papers
Multi-bit Watermark Embedding using Dither Modulation
2015
In this paper we investigate the use of four way dither modulation for high capacity watermark embedding and compare it with conventional approach of binary dither modulation. The embedding is performed in the invariant domain using Zernike moments as these moments provide minimum information redundancy, excellent resistance to noise and possess good image reconstruction capabilities. We have performed detailed experimentation to perform exhaustive comparative analysis of the two embedding methods in terms of visual imperceptibility and robustness to various geometric attacks as well as signal processing attacks.
An audio watermarking scheme using singular value decomposition and dither-modulation quantization
Multimedia Tools and Applications, 2011
Quantization index modulation is one of the best methods for performing blind watermarking, due to its simplicity and good rate-distortion-robustness tradeoffs. In this paper, a new audio watermarking algorithm based on singular value decomposition and dither-modulation quantization is presented. The watermark is embedded using dither-modulation quantization of the singular values of the blocks of the host audio signal. The watermark can be blindly extracted without the knowledge of the original audio signal. Subjective and objective tests confirm high imperceptibility achieved by the proposed scheme. Moreover, the scheme is quite robust against attacks including additive white Gaussian noise, MP3 compression, resampling, low-pass filtering, requantization, cropping, echo addition and denoising. The watermark data payload of the algorithm is 196 bps. Performance analysis of the proposed scheme shows low error probability rates.
A LL Subband Based Digital Watermarking in DWT
International Journal of Engineering and Manufacturing, 2017
Digital watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, image and documents in such a way that the watermark cannot be removed against different attacks. Digital Watermarking is a process to prevent the unauthorized access and modification of data. It ensures that the communication between two parties’ remains secure. Digital watermarking can be performed in spatial and frequency domain. In the spatial domain, the watermark is embedded in the very existence of the pixel. In frequency domain, the transformation of any kind is applied and then information is embedded. In this paper, we proposed an approach to watermarking in frequency domain using DWT technique. The gray scale host image is divided into four sub bands: LL, HL, LH, HH and the watermark are inserted in the LL sub band using DWT technique. As the image is divided into four sub bands, a watermark of equal size of the LL sub band...
An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions
2009
Quantization index modulation (QIM) watermarking proposed by Chen and Wornell provides computational efficient blind watermarking based on Costa’s dirty paper codes. The limitation of this is its vulnerability against amplitude scaling distortion. The present work is proposed to solve this problem based on angle QIM within spread transform dither modulation (STDM) framework. AQIM embeds the information by quantizing the angle formed by the host-signal vector with respect to the origin of a hyperspherical coordinate system as opposed to quantizing the amplitude of pixel values. It has been shown experimentally that the proposed work not only provides the resistance against this valumetric scaling distortion but also against non-linear, gamma correction and constant luminance change.
Amplitude Scale Estimation for Quantization-Based Watermarking
IEEE Transactions on Signal Processing, 2000
In this paper we propose a maximum likelihood technique to combat amplitude scaling attacks within a quantizationbased watermarking context. We concentrate on operations that are common in many applications and at the same time devastating to this class of watermarking schemes, namely, amplitude scaling in combination with additive noise. First we derive the probability density function of the watermarked and attacked data in the absence of subtractive dither. Next we extend these models to incorporate subtractive dither in the encoder. The dither sequence is primarily used for security purposes, and the dither is assumed to be known also to the decoder. We design the dither signal statistics such that an attacker having no knowledge of the dither cannot decode the watermark. Using an approximation of the probability density function in the presence of subtractive dither, we derive a maximum likelihood procedure for estimating amplitude scaling factors. Experiments are performed with synthetic and real audio signals, showing the feasibility of the proposed approach under realistic conditions. Index Terms-Maximum likelihood estimation, probability of error, quantization, statistics, subtractive dither, watermarking.
Provably robust digital watermarking
SPIE Proceedings, 1999
Copyright notification and enforcement, authentication, covert communication, and hybrid transmission are examples of emerging multimedia applications for digital watermarking methods, methods for embedding one signal (e.g., the digital watermark) within another "host" signal to form a third, "composite" signal. The embedding is designed to achieve efficient trade-offs among the three conflicting goals of maximizing information-embedding rate, minimizing distortion between the host signal and composite signal, and maximizing the robustness of the embedding. Quantization index modulation (QIM) methods are a class of watermarking methods that achieve provably good rate-distortion-robustness performance. Indeed, QIM methods exist that achieve performance within a few dB of capacity in the case of a (possibly colored) Gaussian host signal and an additive (possibly colored) Gaussian noise channel. Also, QIM methods can achieve capacity with a type of postprocessing called distortion compensation. This capacity is independent of host signal statistics, and thus, contrary to popular belief, the information-embedding capacity when the host signal is not available at the decoder is the same as the case when the host signal is available at the decoder. A low-complexity realization of QIM called dither modulation has previously been proven to be better than both linear methods of spread spectrum and nonlinear methods of low-bit(s) modulation against square-error distortionconstrained intentional attacks. We introduce a new form of dither modulation called spread-transform dither modulation that retains these favorable performance characteristics while achieving better performance against other attacks such as JPEG compression.
IEEE Transactions on Information Theory, 2001
We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third, "composite" signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing information-embedding rate, minimizing distortion between the host signal and composite signal, and maximizing the robustness of the embedding. We introduce new classes of embedding methods, termed quantization index modulation (QIM) and distortion-compensated QIM (DC-QIM), and develop convenient realizations in the form of what we refer to as dither modulation. Using deterministic models to evaluate digital watermarking methods, we show that QIM is "provably good" against arbitrary bounded and fully informed attacks, which arise in several copyright applications, and in particular, it achieves provably better rate distortion-robustness tradeoffs than currently popular spread-spectrum and low-bit(s) modulation methods. Furthermore, we show that for some important classes of probabilistic models, DC-QIM is optimal (capacity-achieving) and regular QIM is near-optimal. These include both additive white Gaussian noise (AWGN) channels, which may be good models for hybrid transmission applications such as digital audio broadcasting, and mean-square-error-constrained attack channels that model private-key watermarking applications.
Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions
2005
Quantization index modulation (QIM) watermarking has received a great deal of attention ever since the rediscovery of Costa's result on codes with host-interference rejecting properties. While such embedding scheme exhibit considerable improvement in watermark capacity over its earlier predecessors, (e.g. spread-spectrum), their fragility to even the simplest attacks soon became apparent. Among such attacks, amplitude scaling has received special attention. In this paper, we introduce a quantization scheme that is provably insensitive to amplitude scaling attacks, named Angle QIM (AQIM). Instead of embedding information by quantizing the amplitude of pixel values, AQIM works by quantizing the angle formed by the host-signal vector with the origin of a hyperspherical coordinate system. Hence, AQIM's invariance to amplitude scaling can be shown by construction. Experimental results are presented for the bit error rate performance of AQIM under additive white Gaussian noise attacks.
Blind Image Watermarking using Normalized STDM robust against Fixed Gain Attack
2018 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET), 2018
Spread Transform Dither Modulation (STDM), as an extension of Quantization Index Modulation (QIM) is a blind watermarking scheme that achieves high robustness against random noise and re-quantization attacks, with a limitation against the Fixed Gain Attack (FGA). In this paper, we improve the STDM watermarking scheme by making the quantization step size dependent on the watermarked content to resist the FGA attack. Simulations on real images show that our approach achieves strong robustness against the FGA attack, the Additive White Gaussian Noise (AWGN) attack, and the JPEG compression attack while preserving a higher level of transparency.
Robustness improvement in spread spectrum watermarking using M-ary modulation
2004
Spread spectrum (SS) modulation principle is widely used in digital watermarking to satisfy the robustness criterion against various common signal processing operations as well as deliberate external attacks. Several SS image watermarking schemes have been developed in various transform domains such as DCT (discrete cosine transform), DHT (discrete Hadamard transform), Fourier-Mellin, and Wavelet etc using binary signaling. The use of wide spectrum of the cover data in message hiding process puts a limit on data rate subject to a given embedding distortion. The paper investigates the scope of using M-ary modulation principle for performance improvement over binary signaling scheme. The current work also suggests data embedding in selected sub bands using DWT (discrete wavelet transform) and MbDWT (M-band wavelet transform) decomposition. Performance improvement of Mary signaling principle in SS scheme and superiority of wavelet domain embedding over spatial domain approach are also supported by numerical results against JPEG and JPEG 2000 compression operations.