Skip to main content

Improved QIM Strategies for Gaussian Watermarking

  • Conference paper
Book cover Digital Watermarking (IWDW 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3710))

Included in the following conference series:

Abstract

This paper revisits the problem of watermarking a Gaussian host, where the embedder and attacker are subject to mean-squared distortion constraints. The worst (nonadditive) attack and unconstrained capacity have been identified in previous work. Here we constrain the encoding function to lie in a given family of encoding functions — such as spread-spectrum or fixed-dimensional Quantization Index Modulation (QIM), with or without time-sharing, with or without external dithering. This gives rise to the notion of constrained capacity. Several such families are considered in this paper, and the one that is best under the worst attack is identified for each admissible value of the watermark-to-noise ratio (WNR) and the noise-to-host ratio (NHR). With suitable improvements, even scalar QIM can outperform any (improved) spread-spectrum scheme, for any value of WNR and NHR. The remaining gap to unconstrained capacity can be bridged using higher-dimensional lattice QIM.

This work was supported by NSF under grant CCR 03-25924.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Trans. on Information Theory 47(4), 1423–1443 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  2. Eggers, J.J., Bäuml, R., Tzschoppe, R., Girod, B.: Scalar Costa Scheme for Information Embedding. IEEE Transactions on Signal Processing 51(4), 1003–1019 (2003)

    Article  MathSciNet  Google Scholar 

  3. Zamir, R., Shamai (Shitz), S., Erez, U.: Nested Linear/Lattice Codes for Structured Multiterminal Binning. IEEE Trans. Information Theory 48(6), 1250–1276 (2002)

    Article  MATH  Google Scholar 

  4. Erez, U., Zamir, R.: Achieving \(\frac{1}{2} \log(1+SNR)\) on the AWGN Channel with Lattice Encoding and Decoding. IEEE Trans. on Information Theory 50, 2293–2314 (2004)

    Article  MathSciNet  Google Scholar 

  5. Erez, U., ten Brink, S.: Approaching the dirty paper limit for canceling known interference. In: Proc. Allerton Conf., Monticello, IL (September 2003)

    Google Scholar 

  6. Koval, O., Voloshynovskiy, S., Pérez-González, F.: Quantization-Based Watermarking Performance Improvement Using Host Statistics: AWGN Attack Case. In: Proc. ACM Multimedia and Security Workshop, Magdeburg, Germany (September 2004)

    Google Scholar 

  7. Pérez-Freire, L., Pérez-González, F., Voloshynovskiy, S.: Revealing the True Achievable Rates of Scalar Costa Scheme. In: Proc. IEEE Multimedia Signal Proc. Workshop, Siena, Italy, September-October (2004)

    Google Scholar 

  8. Pérez-Freire, L., Pérez-González, F.: Spread-Spectrum vs Quantization-Based Data Hiding: Misconceptions and Implications. In: Proc. SPIE, San Jose, CA (January 2005)

    Google Scholar 

  9. Cox, I.J., Killian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. Image Proc. 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  10. O’Sullivan, J.A., Moulin, P., Ettinger, M.: Information Theoretic Analysis of Steganography. In: Proc. Int. Symp. on Information Theory (ISIT 1998), Boston, MA (August 1998)

    Google Scholar 

  11. Moulin, P., O’Sullivan, J.A.: Information–Theoretic Analysis of Information Hiding. IEEE Trans. on Information Theory 49(3), 563–593 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  12. Moulin, P., Mıhçak, M.K.: The Parallel-Gaussian Watermarking Game. IEEE Trans. on Information Theory 50(2), 272–289 (2004)

    Article  Google Scholar 

  13. Moulin, P., Mıhçak, M.K.: A Framework for Evaluating the Data-Hiding Capacity of Image Sources. IEEE Trans. on Image Processing 11(9), 1029–1042 (2002)

    Article  Google Scholar 

  14. Mıhçak, M.K., Moulin, P.: Information-Embedding Codes Matched to Local Gaussian Image Models. In: Proc. IEEE Int. Conf. on Image Processing, Rochester, NY (September 2002)

    Google Scholar 

  15. Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley, Chichester (1991)

    Book  MATH  Google Scholar 

  16. Moulin, P., Ivanović, A.: Game-Theoretic Analysis of Watermark Detection. In: Proc. IEEE Int. Conf. on Image Processing, Thessaloniki, Greece (October 2001)

    Google Scholar 

  17. Moulin, P., Ivanović, A.: The Zero-Rate Spread-Spectrum Watermarking Game. IEEE Trans. on Signal Processing 51(4), 1098–1117 (2003)

    Article  Google Scholar 

  18. Malvar, H., Florêncio, D.: Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking. IEEE Trans. Signal Processing 51(4), 898–905 (2003)

    Article  Google Scholar 

  19. Willems, F.M.J.: On Gaussian Channels with Side Information at the Transmitter. In: Proc. 9th Symp. on Information Theory in the Benelux, Enschede, The Netherlands, May 1988, pp. 129–135 (1988)

    Google Scholar 

  20. Liu, T., Moulin, P.: Error exponents for watermarking game with squared-error constraints. In: Proc. Int. Symp. Information Theory, Yokohama, Japan (July 2003)

    Google Scholar 

  21. Costa, M.: Writing on Dirty Paper. IEEE Trans. on Information Theory 29(3), 439–441 (1983)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Moulin, P., Wang, Y. (2005). Improved QIM Strategies for Gaussian Watermarking. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_29

Download citation

  • DOI: https://doi.org/10.1007/11551492_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28768-1

  • Online ISBN: 978-3-540-32052-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics