Advertisement

Telecommunication Systems

, Volume 54, Issue 3, pp 305–313 | Cite as

Hybrid additive watermarking and its decoders

  • Jinwei WangEmail author
  • Shiguo Lian
  • Leiming Yan
  • Jin Han
  • Yuxiang Wang
Article

Abstract

With the rapid development of Internet-based media consuming, the piracy issue becomes urgent, which makes copyright protection a hot research topic. There exist various watermarking methods that are regarded as potential solutions to copyright protection. However, most of watermarking methods have different properties, and the combinatorial method is expected to make use of different methods’ advantages and to get a good tradeoff. In this paper, a novel hybrid watermark embedding rule is proposed to select the general additive embedding rule or the special additive embedding rule securely. The selection is controlled by a secret key, and the watermark is embedded into the Discrete Wavelet Transform (DWT) domain. With respect to the hybrid embedding rule, the novel optimum and locally optimum hybrid additive decoder is proposed, which is based on the minimum Bayesian risk criterion. And simultaneously, the performance of the optimum hybrid decoder is theoretically analyzed, with the DWT coefficients modelled as the generalized Gaussian distribution. Furthermore, the security of the proposed hybrid watermarking scheme is proved higher than that of existing schemes. Finally, empirical experimental results are given to prove the validity of theoretical analysis.

Keywords

Hybrid additive rule Optimum and locally optimum Hybrid decoder 

Notes

Acknowledgements

This work was jointly supported by NUIST Research Fund (Grant Numbers 20100390 and 20100391) and the Priority Academic Program Development of Jiangsu Higher Education Institutions.

References

  1. 1.
    Lian, S., Liu, Z., Ren, Z., & Wang, H. (2007). Commutative encryption and watermarking in compressed video data. IEEE Transactions on Circuits and Systems for Video Technology, 17(6), 774–778. CrossRefGoogle Scholar
  2. 2.
    Lian, S. (2010). Secure service convergence based on scalable media coding. Telecommunications Systems, 45(1), 21–35. CrossRefGoogle Scholar
  3. 3.
    Lian, S., & Chen, X. (2010). Lightweight secure multimedia distribution based on homomorphic operations. Telecommunications Systems, doi: 10.1007/s11235-010-9367-2, Online First. Google Scholar
  4. 4.
    Liao, K., Lian, S., Guo, Z., & Wang, J. (2010). Efficient information hiding in H.264/AVC video coding. Telecommunications Systems, doi: 10.1007/s11235-010-9372-5, Online First. Google Scholar
  5. 5.
    Akhaee, M., Sahraeian, S., Sankur, B., & Marvasti, F. (2009). Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Transactions on Multimedia, 11(5), 822–833. CrossRefGoogle Scholar
  6. 6.
    Al-Otum, H., & Samara, N. (2010). A robust blind color image watermarking based on wavelet-tree bit host difference selection. Signal Processing, 90(8), 2498–2512. CrossRefGoogle Scholar
  7. 7.
    Zhang, Y., Niu, X., & Zhao, D. (2005). A method of protecting relational databases copyright with cloud watermark. International Journal of Information and Communication Engineering, 1(7), 337–341. Google Scholar
  8. 8.
    Mairgiotis, A., Galatsanos, N., & Yang, Y. (2008). New additive watermark detectors based on a hierarchical spatially adaptive image model. IEEE Transactions on Information Forensics and Security, 3(1), 29–37. CrossRefGoogle Scholar
  9. 9.
    Kwitt, R., Meerwald, P., & Uhl, A. (2009). Blind DT-CWT domain additive spread spectrum watermark detection. In 16th international conference on digital signal processing, Santorini-Hellas (pp. 1–8). Google Scholar
  10. 10.
    Kim, H., Choi, D., Choi, H., & Kim, T. (2010). Selective correlation detector for additive spread spectrum watermarking in transform domain. Signal Processing, 90(10), 2605–2610. Google Scholar
  11. 11.
    Deng, C., Wang, S., Sun, H., & Cao, H. (2009). In Multiplicative spread spectrum watermarks detection performance analysis in curvelet domain. International conference on e-business and information system security, Wuhan, China (pp. 1–4). Google Scholar
  12. 12.
    Cheng, Q. (2009). Generalized embedding of multiplicative watermarks. IEEE Transactions on Circuits and Systems for Video Technology, 19(7), 978–988. CrossRefGoogle Scholar
  13. 13.
    Pérez-González, F., & Mosquera, C. (2008). Quantization-based data hiding robust to linear-time-invariant filtering. IEEE Transactions on Information Forensics and Security, 3(2), 137–152. CrossRefGoogle Scholar
  14. 14.
    Hernández, J. R., Amado, M., & Pérez-González, F. (2000). DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Transactions on Image Processing, 9(1), 55–68. CrossRefGoogle Scholar
  15. 15.
    Li, Z., Kwong, S., Choy, M., Xiao, W., Zhen, J., & Zhang, J. (2003). An intelligent watermark detection decoder based on independent component analysis. In T. Kalker et al. (Eds.), LNCS: Vol. 2939. International workshop on digital watermarking, Seoul, Korea (pp. 223–234). Berlin: Springer. CrossRefGoogle Scholar
  16. 16.
    Xiao, J., & Wang, Y. (2009). Multiple watermarking with side information. In H. J. Kim, S. Katzenbeisser, & A. T. S. Ho (Eds.) LNCS: Vol. 5450. International workshop on digital watermarking (pp. 379–387). Berlin: Springer. CrossRefGoogle Scholar
  17. 17.
    Senda, K., & Kawamura, M. (2010). Statistical-mechanical approach for multiple watermarks using spectrum spreading. In K. Kurosawa (Ed.) LNCS: Vol. 5973. The 2009 4th international conference on information theoretic security, Shizuoka, Japan (pp. 231–247). Berlin: Springer. Google Scholar
  18. 18.
    Wang, J., Liu, G., Dai, Y., Sun, J., Wang, Z., & Lian, S. (2008). Locally optimum detection for Barni’s multiplicative watermarking in DWT domain. Signal Processing, 88(1), 117–130. CrossRefGoogle Scholar
  19. 19.
    Barni, M., Bartolini, F., Rosa, A., & Piva, A. (2000). Capacity of full frame DCT image watermarks. IEEE Transactions on Image Processing, 9(8), 1450–1455. CrossRefGoogle Scholar
  20. 20.
    Lian, S. (2008). Multimedia content encryption: techniques and applications. New York: Auerbach Publication, Taylor & Francis Group. Google Scholar
  21. 21.
    Lewis, A., & Knowles, G. (1992). Image compression using the 2-D wavelet transform. IEEE Transactions on Image Processing, 1(2), 244–250. CrossRefGoogle Scholar
  22. 22.
    Petitcolas, F. (2002). Stirmark Benchmark. http://www.petitcolas.net/fabien/watermarking/stirmark/.

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Jinwei Wang
    • 1
    Email author
  • Shiguo Lian
    • 2
  • Leiming Yan
    • 1
  • Jin Han
    • 1
  • Yuxiang Wang
    • 1
  1. 1.Jiangsu Engineering Center of Network Monitoring, School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingP.R. China
  2. 2.Corporate ResearchHuawei Technologies, Co. LTD.BeijingP.R. China

Personalised recommendations