A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding

被引:10
作者
Abrardo, Andrea [1 ,2 ]
Barni, Mauro [1 ,2 ]
机构
[1] Univ Siena, Dept Informat Engn & Math, I-53100 Siena, Italy
[2] Univ Siena, Natl Univ Consortium Telecommun Res Unit, I-53100 Siena, Italy
关键词
Watermarking; dirty paper chanel; spherical codes; antipodal watermarking; gain attack; informed embedding; SPREAD-SPECTRUM WATERMARKING; PERFORMANCE ANALYSIS; ROBUST; INFORMATION; MODULATION; CAPACITY; AUDIO; ATTACKS; DESIGN;
D O I
10.1109/TIFS.2014.2333592
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We investigate the performance of a watermarking system in which the encoder is forced to use a binning strategy based on antipodal binary-valued sequences. The use of antipodal binary random binning has several advantages, including the possibility of relying on simple and effective binary code constructions and the ease with which this kind of schemes can cope with amplitude scaling. By relying on a novel binning strategy, we derive a lower bound of the Gelfand-Pinsker capacity of the watermark channel when the encoder is forced to use an antipodal binary auxiliary random variable, showing that for low to moderate bit-rates, the bound coincides with Costa's capacity. We exploit the properties of the new binning strategy, to develop a practical watermarking system and show that the new scheme outperforms previous constructions, exhibiting very good performance also in the presence of gain attack. Preliminary results on audio signals show that the new scheme retains its good performance also when used for the watermarking of real multimedia data.
引用
收藏
页码:1380 / 1393
页数:14
相关论文
共 32 条
[1]   Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding [J].
Abrardo, A ;
Barni, M .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (02) :824-833
[2]  
Abrardo A., 2006, IEE Proceedings-Information Security, V153, P107, DOI 10.1049/ip-ifs:20055152
[3]  
[Anonymous], 1992, JTC1SC29WG11 MPEG
[4]   Quality evaluation of watermarked audio tracks [J].
Arnold, M ;
Schilz, K .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :91-101
[5]  
Barni M., 2004, Watermarking Systems Engineering: Enabling Digital AssetsSecurity and other Applications
[6]   Performance analysis of ST-DM watermarking in presence of nonadditive attacks [J].
Bartolini, F ;
Barni, M ;
Piva, A .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2004, 52 (10) :2965-2974
[7]   Robust audio watermarking in the time domain [J].
Bassia, P ;
Pitas, I ;
Nikolaidis, N .
IEEE TRANSACTIONS ON MULTIMEDIA, 2001, 3 (02) :232-241
[8]   Serial concatenation of interleaved codes: Performance analysis, design, and iterative decoding [J].
Benedetto, S ;
Divsalar, D ;
Montorsi, G ;
Pollara, F .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (03) :909-926
[9]   Digital watermarks for audio signals [J].
Boney, L ;
Tewfik, AH ;
Hamdy, KN .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, 1996, :473-480
[10]  
Chaumont M., 2009, P INT WORKSH DIG WAT