Watermarking via optimization algorithms for quantizing randomized semi-global image statistics

被引:3
作者
Mihçak, MK
Venkatesan, R
Liu, T
机构
[1] Univ Illinois, Urbana, IL 61801 USA
[2] Microsoft Res, Redmond, WA 98053 USA
关键词
watermarking; image watermarking; security; randomization; semi-global image statistics; dithered quantization; estimation attacks;
D O I
10.1007/s00530-005-0201-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a novel approach for blind and semi-blind watermarking and apply it to images. We derive randomized robust semi-global statistics of images in a suitable transform domain (wavelets in case of images) and quantize them in order to embed the watermark. Quantization is effectively carried out by embedding to the host a computed sequence, which is obtained by solving an optimization problem whose parameters are known to the information hider but unknown to the attacker. An essential emphasis of the proposed method is randomization, which is crucial for security and robustness against arbitrary quality-preserving attacks. We formally show that malicious optimal estimation attacks that are specifically derived for our algorithm are ineffective in practice. Furthermore, we experimentally demonstrate that our watermarking method survives many generic benchmark attacks for a large number of images.
引用
收藏
页码:185 / 200
页数:16
相关论文
共 32 条
[1]  
[Anonymous], P IEEE INT C IM PROC
[2]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[3]  
CHEN B, 1999, P ICMCS FLOR IT
[4]   The Gaussian watermarking game [J].
Cohen, AS ;
Lapidoth, A .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2002, 48 (06) :1639-1667
[5]  
DEGUILLAUME F, 2002, P SPIE SAN JOS CA
[6]  
EGGERS J, 2001, THESIS F ALEXANDER U
[7]   Scalar costa scheme for information embedding [J].
Eggers, JJ ;
Bäuml, R ;
Tzschoppe, R ;
Girod, B .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (04) :1003-1019
[8]  
Gersho A., 1992, VECTOR QUANTIZATION
[9]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[10]  
Horn R. A., 1986, Matrix analysis