Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding

  • Benjamin Mathon
  • Patrick Bas
  • François Cayre
  • Fernando Pérez-González
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5284)


This paper is the continuation of works about analysis of secure watermarking schemes in the case of WOA (Watermarked Only Attack) framework. In previous works, two new BPSK spread-spectrum watermarking modulations, Natural Watermarking (NW) and Circular Watermarking (CW), have been proposed and have been shown to be more secure than classical modulations. Because security is guaranted using specific distributions of watermarked contents, we propose to use optimal model-based embedding to ensure security while minimizing the overall distortion. Additionally, we propose a new secure watermarking scheme based on distribution of vector norms in the Gaussian case. We illustrate model-based embedding performance in the case of Gaussian signals and show that this approach not only allows to achieve excellent level of security in the WOA framework, but also allows to minimize distortion. Finally, a comparison of the robustness of the proposed embedding schemes is performed.


Watermarking Security Hungarian method Distortion Optimization 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kalker, T.: Considerations on watermarking security. In: Proc. MMSP, pp. 201–206 (October 2001)Google Scholar
  2. 2.
    Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences militaires IX, 5–38 (1883)Google Scholar
  3. 3.
    Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of data hiding security and their application to spread-spectrum analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Kutter, M., Voloshynovskiy, S., Herrigel, A.: The watermark copy attack. In: Electronic Imaging 2000, Security and Watermarking of Multimedia Content II, vol. 3971 (2000)Google Scholar
  5. 5.
    Cayre, F., Furon, T., Fontaine, C.: Watermarking security: Theory and practice. IEEE Trans. Signal Process. 53(10), 3976–3987 (2005)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Cayre, F., Bas, P.: Kerckhoffs based embedding security classes. IEEE Trans. Inf. Forensics Security (2007)Google Scholar
  7. 7.
    Mathon, B., Bas, P., Cayre, F.: Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking. In: Proc. ACM MM&Sec 2007 (September 2007)Google Scholar
  8. 8.
    Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Shannon, C.E.: Communication theory of secrecy systems. Bell System Technical Journal 28, 656–715 (1949)MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    Malvar, H.S., Flôrencio, D.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process. 53, 898–905 (2003)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Moulin, P., Briassouli, A.: A stochastic qim algorithm for robust, undetectable image watermarking. In: ICIP, pp. 1173–1176 (2004)Google Scholar
  12. 12.
    Kuhn, H.W.: The Hungarian method of solving the assignment problem. Naval Res. Logistics Quart. 2, 83–97 (1955)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Hill, I.D., Pike, M.C.: Algorithm 299. ACM TOMS, p. 185 (June 1985)Google Scholar
  14. 14.
    Ibbetson, D.: Algorithm 209. Collected Algorithms of the CACM, p. 616 (1963)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Benjamin Mathon
    • 1
  • Patrick Bas
    • 1
  • François Cayre
    • 1
  • Fernando Pérez-González
    • 2
  1. 1.Gipsa-Lab Département Images et SignalDomaine universitaireSaint Martin d’Hères cedexFrance
  2. 2.Departamento de Teoría de la Señal y las Comunicaciones Signal Processing in Communications GroupUniversidad de VigoVigoSpain

Personalised recommendations