Skip to main content

Informed Embedding for Multi-bit Watermarks

  • Conference paper
  • First Online:
Digital Watermarking (IWDW 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2613))

Included in the following conference series:

  • 349 Accesses

Abstract

Informed embedding is the practice of tailoring each watermarking pattern according to the cover Work in which it is to be embedded. The objective is to attain an optimal trade-off between estimates of perceptual fidelity and robustness. To date, our own studies of informed embedding have been limited to watermarks with very small data payloads. Our purpose in the present paper is to develop a method of informed embedding that is suitable for watermarks with large data payloads.

The method we develop employs an estimate of robustness based on the amount of white noise that can be added before a message error becomes likely. We present an iterative, Monte-Carlo algorithm that tries to ensure watermarks are embedded with a specified value of this robustness estimate. This algorithm is tested in an image watermarking system, and is found to successfully embed robust, 129-bit watermarks in 368 × 240 images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chen, B., Wornell, G. W.: An information-theoretic approach to the design of robust digital watermarking systems. IEEE Transactions on Acoustics, Speech, and Signal Processing (1999)

    Google Scholar 

  2. Chou, J., Pradhan, S. S., Ramchandran, K.: On the duality between distributed source coding and data hiding. Thirty-third Asilomar Conference on Signals, Systems, and Computers 2 (1999) 1503–1507

    Google Scholar 

  3. Cox, I. J., Miller, M. L., Bloom, J. A.: Digital Watermarking. Morgan Kaufmann (2001)

    Google Scholar 

  4. Cox, I. J., Miller, M. L., McKellips, A.: Watermarking as communications with side information. Proceedings of the IEEE 87(7) (1999) 1127–1141

    Google Scholar 

  5. Eggers, J. J., Su, J. K., Girod, B.: A blind watermarking scheme based on structured codebooks. IEE Seminar on Secure Images and Image Authetication (2000) 4/1–4/21

    Google Scholar 

  6. Miller, M. L., Cox, I. J., Bloom, J. A.: Informed embedding: exploiting image and detector information during watermark insertion. IEEE International Conference on Image Processing (2000)

    Google Scholar 

  7. Miller, M. L., Doërr, G. J., Cox, I. J.: Applying informed coding and embedding to design a robust, high capacity watermark. IEEE Transactions on Image Processing (to appear)

    Google Scholar 

  8. Ramkumar, M.: Data Hiding in Multimedia: Theory and Applications. PhD thesis, New Jersey Institute of Technology (1999)

    Google Scholar 

  9. Shannon, C. E.: Channels with side information at the transmitter. IBM Journal of Research and Development (1958) 289–293

    Google Scholar 

  10. Viterbi, A. J.: CDMA: principles of spread spectrum communications. Addison Wesley Longman Inc. (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Miller, M.L., Doërr, G.J., Cox, I.J. (2003). Informed Embedding for Multi-bit Watermarks. In: Kim, H.J. (eds) Digital Watermarking. IWDW 2002. Lecture Notes in Computer Science, vol 2613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36617-2_2

Download citation

  • DOI: https://doi.org/10.1007/3-540-36617-2_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-01217-7

  • Online ISBN: 978-3-540-36617-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics