Results 1 - 10
of
21
Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding
- IEEE TRANS. ON INFORMATION THEORY
, 1999
"... We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third, "composite" signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing information-embedding rate, mini ..."
Abstract
-
Cited by 495 (15 self)
- Add to MetaCart
(Show Context)
We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third, "composite" signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing information-embedding rate, minimizing distortion between the host signal and composite signal, and maximizing the robustness of the embedding. We introduce new classes of embedding methods, termed quantization index modulation (QIM) and distortion-compensated QIM (DC-QIM), and develop convenient realizations in the form of what we refer to as dither modulation. Using deterministic models to evaluate digital watermarking methods, we show that QIM is "provably good" against arbitrary bounded and fully informed attacks, which arise in several copyright applications, and in particular, it achieves provably better rate distortion--robustness tradeoffs than currently popular spread-spectrum and low-bit(s) modulation methods. Furthermore, we show that for some important classes of probabilistic models, DC-QIM is optimal (capacity-achieving) and regular QIM is near-optimal. These include both additive white Gaussian noise (AWGN) channels, which may be good models for hybrid transmission applications such as digital audio broadcasting, and mean-square-error-constrained attack channels that model private-key watermarking applications.
Expansion Embedding Techniques for Reversible Watermarking
"... Abstract—Reversible watermarking enables the embedding of useful information in a host signal without any loss of host information. Tian’s difference-expansion technique is a high-capacity, reversible method for data embedding. However, the method suffers from undesirable distortion at low embedding ..."
Abstract
-
Cited by 57 (0 self)
- Add to MetaCart
(Show Context)
Abstract—Reversible watermarking enables the embedding of useful information in a host signal without any loss of host information. Tian’s difference-expansion technique is a high-capacity, reversible method for data embedding. However, the method suffers from undesirable distortion at low embedding capacities and lack of capacity control due to the need for embedding a location map. We propose a histogram shifting technique as an alternative to embedding the location map. The proposed technique improves the distortion performance at low embedding capacities and mitigates the capacity control problem. We also propose a reversible data-embedding technique called prediction-error expansion. This new technique better exploits the correlation inherent in the neighborhood of a pixel than the difference-expansion scheme. Prediction-error expansion and histogram shifting combine to form an effective method for data embedding. The experimental results for many standard test images show that prediction-error expansion doubles the maximum embedding capacity when compared to difference expansion. There is also a significant improvement in the quality of the watermarked image, especially at moderate embedding capacities. Index Terms—Content authentication, difference expansion (DE), digital watermarking, expansion embedding, prediction-error expansion, reversible watermarking. I.
A Robust Optimization Solution to the Data Hiding Problem using Distributed Source Coding Principles
- in Proc. of SPIE Vol. 3974: Image and Video Communications and Processing 2000
, 2000
"... Inspired by a recently proposed constructive framework for the distributed source coding problem, 1 we propose a powerful constructive approach to the watermarking problem, emphasizing the dual roles of "source codes" and "channel codes." In our framework, we explore various sour ..."
Abstract
-
Cited by 32 (1 self)
- Add to MetaCart
(Show Context)
Inspired by a recently proposed constructive framework for the distributed source coding problem, 1 we propose a powerful constructive approach to the watermarking problem, emphasizing the dual roles of "source codes" and "channel codes." In our framework, we explore various source and channel codes to achieve watermarks that are robust to attackers in terms of maximizing the distortion between the corrupted coded-source signal and the original signal while holding the distortion between the coded-source signal and the original signal constant. We solve the resulting combinatorial optimization problem using an original technique based on robust optimization and convex programming. Keywords: Data Hiding, Digital Watermarking, Multimedia, Convex Optimization, Robustness 1. INTRODUCTION Digital watermarking (data hiding) is an emerging research area that has received a considerable amount of attention in recent years. The basic idea behind digital watermarking is to embed information...
Achievable Performance of Digital Watermarking Systems
- Proc. Int. Conf. Multimedia Computing and Systems
, 1999
"... ..."
Reversible data hiding based on wavelet spread spectrum
- in IEEE 6th Workshop on Multimedia Signal Processing
, 2004
"... Abstract: This paper presents a reversible data hiding method based on wavelet spread spectrum and histogram modification. Using the spread spectrum scheme, we embed data in the coefficients of integer wavelet transform in high frequency subbands. The pseudo bits are also embedded so that the decode ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
Abstract: This paper presents a reversible data hiding method based on wavelet spread spectrum and histogram modification. Using the spread spectrum scheme, we embed data in the coefficients of integer wavelet transform in high frequency subbands. The pseudo bits are also embedded so that the decoder does not need to know which coefficients have been selected for data embedding, thus enhancing data hiding efficiency. To prevent the overflow and underflow, an efficient histogram modification method is developed and utilized. Experimental results on some frequently used images show that our method has achieved superior performance in terms of high data embedding capacity and high visual quality of marked images, compared with the existing reversible data hiding schemes.
Reversible watermarking scheme with image-independent embedding capacity
"... Permanent distortion is one of the main drawbacks of all the irreversible watermarking schemes. Attempts to recover the original signal after the signal passing the authentication process are being made starting just a few years ago. Some common problems, such as salt-and-pepper artifacts due to int ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
(Show Context)
Permanent distortion is one of the main drawbacks of all the irreversible watermarking schemes. Attempts to recover the original signal after the signal passing the authentication process are being made starting just a few years ago. Some common problems, such as salt-and-pepper artifacts due to intensity wraparound and low embedding capacity, can now be resolved. However, we point out in this work that there are still some significant problems remain unsolved. Firstly, the embedding capacity is signal-dependent, i.e., capacity varies significantly depending on the nature of the host signal. The direct impact of this ill factor is compromised security for signals with low capacity. Some signal may be even non-embeddable. Secondly, while seriously tackled in the irreversible watermarking schemes, the well-recognized problem of block-wise dependence, which opens a security gap for the vector quantization attack and transplantation are not addressed by the researchers of the reversible schemes. It is our intention in this work to propose a reversible watermarking scheme with near-constant signal-independent embedding capacity and immunity to the vector quantization attack and transplantation. 1 1.
Reversible Authentication Watermark for Image
, 2008
"... Reversible (invertible, lossless) authentication draws much attention recently for its ability to restore the original image from marked image without any distortions upon verification. In this paper, we propose a reversible watermarking scheme for image authentication based on histogram modificatio ..."
Abstract
- Add to MetaCart
Reversible (invertible, lossless) authentication draws much attention recently for its ability to restore the original image from marked image without any distortions upon verification. In this paper, we propose a reversible watermarking scheme for image authentication based on histogram modification in integer wavelet transform (IWT) domain. The proposed scheme has features: i) Reversibility, high embedding capacity, and good perceptual invisibility; ii) Tamper localization and discerning; iii) Detection without requiring explicit knowledge of the original image; iv) Verification before reconstruction of the original image, therefore computational requirements are reduced when reconstruction isn’t needed. To our best knowledge, none of the reversible authentication schemes reported in the literature has all of the features. Those features make the proposed scheme practical, effective and appealing for strict content integrity authentication system. Experimental results demonstrate the feasibility and validity of the proposed scheme.
A Wavelet based Digital Watermarking Method using Thresholds on Intermediate Bit Values
"... Many researchers are concentrating to provide a high confidentiality and data integrity to protect against unauthorized access. The network security is becoming a very important and crucial aspect as the number of data being exchanged and number of users being communicated on the internet increases ..."
Abstract
- Add to MetaCart
(Show Context)
Many researchers are concentrating to provide a high confidentiality and data integrity to protect against unauthorized access. The network security is becoming a very important and crucial aspect as the number of data being exchanged and number of users being communicated on the internet increases rapidly day by day. Therefore confidentiality of users and data integrity are required to protect against unauthorized access. To address the issues of authentication, the present paper proposes a novel wavelet based Digital Watermarking (DW) approach with two steps. In the first step a Threshold, based on Intermediate Bit Values (TIBV) of image pixels is proposed by selecting the image pixel for inserting the watermark. In the second step Alattar‟s method is used for inserting the Digital Watermark (DW) bits in the selected pixels of the first step. These two steps make the proposed TIBV-DW method as more effective and difficult to break. To test the efficacy of the proposed TIBV-DW method, various statistical measures by considering combinations of various attacks are evaluated on various experimental images, which indicate high robustness, imperceptibility, un-ambiguity, confidentiality and integrity of the present method.
SECURING BIOMETRIC IMAGES USING REVERSIBLE WATERMARKING
"... Biometric security is a fast growing area. Protecting biometric data is very important since it can be misused by attackers. In order to increase security of biometric data there are different methods in which watermarking is widely accepted. A more acceptable, new important development in this area ..."
Abstract
- Add to MetaCart
(Show Context)
Biometric security is a fast growing area. Protecting biometric data is very important since it can be misused by attackers. In order to increase security of biometric data there are different methods in which watermarking is widely accepted. A more acceptable, new important development in this area is reversible watermarking in which the original image can be completely restored and the watermark can be retrieved. But reversible watermarking in biometrics is an understudied area. Reversible watermarking maintains high quality of biometric data. This paper proposes Rotational Replacement of LSB as a reversible watermarking scheme for biometric images. PSNR is the regular method used for quality measurement of biometric data. In this paper we also show that SSIM Index is a better alternate for effective quality assessment for reversible watermarked biometric data by comparing with the well known reversible watermarking scheme using Difference Expansion.