Skip to main content
Log in

Watermarking via optimization algorithms for quantizing randomized semi-global image statistics

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

We introduce a novel approach for blind and semi-blind watermarking and apply it to images. We derive randomized robust semi-global statistics of images in a suitable transform domain (wavelets in case of images) and quantize them in order to embed the watermark. Quantization is effectively carried out by embedding to the host a computed sequence, which is obtained by solving an optimization problem whose parameters are known to the information hider but unknown to the attacker. An essential emphasis of the proposed method is randomization, which is crucial for security and robustness against arbitrary quality-preserving attacks. We formally show that malicious optimal estimation attacks that are specifically derived for our algorithm are ineffective in practice. Furthermore, we experimentally demonstrate that our watermarking method survives many generic benchmark attacks for a large number of images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mıhçak, M.K., Venkatesan, R., Kesal, M.: Watermarking via optimization algorithms for quantizing randomized statistics of image regions. In: Proceedings of the 40th Annual Allerton Conf. Comm., Contr. and Computing. Monticello, Illinois (2002)

  2. Moulin, P., O'Sullivan, J.A.: Information-theoretic analysis of information hiding. IEEE Trans. Inform. Theory 39, 563–593 (2003)

    MathSciNet  Google Scholar 

  3. Cohen, A.S., Lapidoth, A.: The Gaussian watermarking game. IEEE Trans. Inform. Theory (Special Issue on Shannon Theory) 48, 1639–1667 (2002)

    MathSciNet  Google Scholar 

  4. Somekh-Baruch, A., Merhav, N.: On the capacity game of public watermarking systems. IEEE Trans. Inform. Theory 50, 511–524 (2004)

    Article  MathSciNet  Google Scholar 

  5. Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inform. Theory 47, 1423–1443 (2001)

    Article  MathSciNet  Google Scholar 

  6. Zamir, R., Shamai (Shitz), S., Erez, U.: Nested linear/lattice codes for structured multiterminal binning. IEEE Trans. Inform. Theory 48, 1250–1276 (2002)

    MathSciNet  Google Scholar 

  7. Eggers, J.J.: Information embedding and digital watermarking as communication with side information. Ph.D. Thesis, Friedrich-Alexander-Universität Erlangen-Nürnberg (2001)

  8. Chen, B., Wornell, G.W.: Achievable performance of digital watermarking systems. In: Proceedings of the ICMCS. Florence, Italy (1999)

  9. Liu, T., Venkatesan, R., Mıhçak, M.K.: Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics. In: Proceedings of the ACM Multimedia and Security Workshop. Magdeburg, Germany (2004)

  10. Kucukgoz, M., Harmanci, O., Mıhçak, M.K., Venkatesan, R.: Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics. In: Proceedings of the SPIE. San Jose, CA (2005)

  11. Kirovski, D., Malvar, H.S.: Spread-spectrum watermarking of audio signals. IEEE Trans. Signal Processing 51, 1020–1033 (2003)

    MathSciNet  Google Scholar 

  12. Pereira, S., Pun, T.: Fast robust template matching for affine resistant watermarks. In: Proceedings of the 3rd Int. Workshop Inform. Hiding, vol. 1768, pp.~199–210 (1999)

  13. Deguillaume, F., Voloshynovskiy, S., Pun, T.: Method for the estimation and recovering from general affine transforms. In: Proceedings of the SPIE. San Jose, CA (2002)

  14. Mıhçak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of discrete-sequence spread spectrum watermarks. In: Proceedings of the 5th Int. Workshop Inform. Hiding, Noordwijkerhout, The Netherlands (2002)

  15. Mıhçak, M.K., Venkatesan, R.: Blind image watermarking via derivation and quantization of robust semi-global statistics. In: Proceedings of the IEEE Int. Conf. Acoustics, Speech and Signal Processing. Orlando, FL (2002)

  16. Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: Proceedings of the IEEE Int. Conf. Image Processing. Vancouver, Canada (2000)

  17. Petitcolas, F.A.P., Kuhn, M.G.: StirMark software. Available at http://www.cl.cam.ac.uk/~fapp2/watermarking/image_watermarking/stirmark/

  18. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    Google Scholar 

  19. Liu, T., Moulin, P.: Error exponents for one-bit watermarking. In: Proceedings of the IEEE Int. Conf. Acoustics, Speech and Signal Processing. Hong Kong (2003)

  20. Eggers, J.J., Bäuml, R., Tzschoppe, R., Girod, B.: Scalar Costa scheme for information embedding. IEEE Trans. Signal Processing 51, 1003–1019 (2003)

    Article  Google Scholar 

  21. Horn, R.A., Johnson, C.R.: Matrix Analysis. Cambridge University Press, Cambridge (1985)

    Google Scholar 

  22. Gersho, A., Gray, R.M.: Vector Quantization and Signal Compression. Kluwer Academic Press, New York (1992)

    Google Scholar 

  23. Poor, H.V.: An Introduction to Signal Detection and Estimation. 2nd ed. Springer-Verlag, New York (1994)

    Google Scholar 

  24. Pereira, S., Voloshynovskiy, S., Madueño, M., Marchand-Maillet, S., Pun, T.: Checkmark software. Available at http://watermarking.unige.ch/Checkmark/

  25. Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J.J., Su, K.: Attacks on digital watermarks: Classification, estimation-based attacks and benchmarks. IEEE Communications Magazine 39, 118–127 (2001)

    Article  Google Scholar 

  26. Linnartz, J.-P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Proceedings of the 2nd Int. Workshop Inform. Hiding, vol. 1525, pp.~258–272 (1998)

  27. Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Processing 9, 432–441 (2000)

    Google Scholar 

  28. Kutter, M., Voloshynovskiy, S., Herrigal, A.: The watermark copy attack. In: Proceedings of the Electronic Imaging. San Jose, CA (2000)

  29. Kirovski, D., Petitcolas, F.A.P.: Blind pattern matching attack on watermarking systems. IEEE Trans. Signal Processing 51, 1045–1053 (2003)

    MathSciNet  Google Scholar 

  30. Mıhçak, M.K., Moulin, P.: Information embedding codes matched to locally stationary Gaussian image models. In: Proceedings of the IEEE Int. Conf. on Image Processing. Rochester, NY (2002)

  31. LoPresto, S., Ramchandran, K., Orchard, M.T.: Image coding based on mixture modeling of wavelet coefficients and a fast estimation-quantization framework. In: Proceedings of the Data Compression Conference. Snowbird, UT (1997)

  32. Mıhçak, M.K., Kozintsev, I., Ramchandran, K., Moulin, P.: Low complexity image denoising based on statistical modeling of wavelet coefficients. IEEE Signal Processing Letters 6, 300–303 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tie Liu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mıhçak, M.K., Venkatesan, R. & Liu, T. Watermarking via optimization algorithms for quantizing randomized semi-global image statistics. Multimedia Systems 11, 185–200 (2005). https://doi.org/10.1007/s00530-005-0201-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-005-0201-8

Keywords

Navigation