Permutation-Based Signature Generation for Spread-Spectrum Video Watermarking

被引:1
作者
Ito, Hiroshi [1 ]
Kasezawa, Tadashi [2 ]
机构
[1] Nihon Univ, Coll Ind Technol, Narashino, Chiba 2758575, Japan
[2] Nihon Univ, Coll Engn, Koriyama, Fukushima 9631165, Japan
关键词
spread-spectrum; watermarking; information hiding; permutation; blind estimation;
D O I
10.1587/transinf.2018MUP0005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Generation of secure signatures suitable for spread-spectrum video watermarking is proposed. The method embeds a message, which is a two-dimensional binary pattern, into a three-dimensional volume, such as video, by addition of a signature. The message can be a mark or a logo indicating the copyright information. The signature is generated by shuffling or permuting random matrices along the third or time axis so that the message is extracted when they are accumulated after demodulation by the correct key. In this way, a message is hidden in the signature having equal probability of decoding any variation of the message, where the key is used to determine which one to extract. Security of the proposed method, stemming from the permutation, is evaluated as resistance to blind estimation of secret information. The matrix-based permutation allows the message to survive the spatial down-sampling without sacrificing the security. The downside of the proposed method is that it needs more data or frames to decode a reliable information compared to the conventional spread-spectrum modulation. However this is minimized by segmenting the matrices and applying permutation to sub-matrices independently. Message detectability is theoretically analyzed. Superiority of our method in terms of robustness to blind message estimation and down-sampling is verified experimentally.
引用
收藏
页码:31 / 40
页数:10
相关论文
共 18 条
[1]  
[Anonymous], 2010, Advanced Statistical Steganalysis
[2]  
[Anonymous], 2010, STEGANOGRAPHY DIGITA
[3]   Asymptotically Optimum Perfect Universal Steganography of Finite Memoryless Sources [J].
Balado, Felix ;
Haughton, David .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (02) :1199-1216
[4]  
Bas P, 2016, IEEE INT WORKS INFOR
[5]  
Cayre F, 2005, LECT NOTES COMPUT SC, V3304, P171
[6]  
Cox IJ, 2008, MKS MULTIMED INFORM, P1
[7]   Practical Poissonian-Gaussian noise modeling and fitting for single-image raw-data [J].
Foi, Alessandro ;
Trimeche, Mejdi ;
Katkovnik, Vladimir ;
Egiazarian, Karen .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2008, 17 (10) :1737-1754
[8]  
Fridrich J., 2004, MMSEC 04, P4, DOI DOI 10.1145/1022431.1022435
[9]  
Fridrich J., 2007, P SPIE SECURITY STEG, V6505
[10]  
Gkizeli M., 2005, IEEE INT C IM PROC S