Abstract
Hybrid multi-watermarking uses different embedding rules to embed one or multiple watermarks into the same region of the cover imperceptibly and alternatively. It is considered as a potential way to implement the copyright protection of the cover and the trace of illegal distribution in multi-party content distribution. However, there are some open issues in creating a good hybrid multi-watermarking scheme, including the combination among multiple embedding rules and the combination among multiple watermarks. In this paper, we establish two novel hybrid multi-bit additive multi-watermarking models, and a novel hybrid multi-watermarking scheme based on the models, which embeds the multiple watermarks into DWT coefficients controlled by a secret key. Nextly, the hybrid multi-watermarking decoders, i.e., optimum and locally optimum, are deduced based on the minimum Bayesian risk criterion and the generalized Gaussian distribution. To evaluate the schemes’ performance, the average bit error rate is used to exactly analyze the performance of the optimum hybrid multi-watermarking decoders. Furthermore, the security of the proposed hybrid scheme is compared with that of the existing schemes. Finally, the robustness of the proposed hybrid scheme and the validity of the theoretical analysis is proved by the experimental results.










Similar content being viewed by others
References
Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in compressed video data. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)
Akhaee, M., Sahraeian, S., Sankur, B., Marvasti, F.: Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Trans. Multimed. 11(5), 822–833 (2009)
Al-Otum, H., Samara, N.: A robust blind color image watermarking based on wavelet-tree bit host difference selection. Signal Process. 90(8), 2498–2512 (2010)
Fridrich, J., Goljan, M., Baldoza, A.C.: New fragile authentication watermark for Images. 2000 Int. Conf. Image Process. 1, 446–449 (2000)
Puhan, N., Ho, A.: Secure authentication watermarking for localization against the Holliman–Memon attack. Multimed. Syst. 12(6), 521–532 (2007)
Uehara, T., Safavi-Naini, R., Ogunbona, P.: A secure and flexible authentication system for digital images. Multimed. Syst. 9(6), 441–456 (2004)
Malvar, H., Florencio, D.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Image Process. 51(4), 898–905 (2003)
Tian, H., Zhao, Y., Ni, R., Cao, G.: Geometrically robust image watermarking by sector-shaped partitioning of geometric-invariant regions. Opt. Express 17(24), 21819–21836 (2009)
Du, L., Cao, X., Zhang, M., Fu, H.: Blind robust watermarking mechanism based on maxima curvature of 3D motion data. Inf. Hiding 7692, 110–124 (2013)
Zhang, Y., Niu, X., Zhao, D.: A method of protecting relational databases copyright with cloud watermark. J. Inf. Commun. Eng. 1(7), 337–341 (2005)
Mairgiotis, A., Galatsanos, N., Yang, Y.: New additive watermark detectors based on a hierarchical spatially adaptive image model. IEEE Trans. Inf. Foresics Secur. 3(1), 29–37 (2008)
Kwitt, R., Meerwald, P., Uhl, A.: Blind DT-CWT domain additive spread spectrum watermark detection. In: Proceedings of the 16th International Conference on Digital Signal Processing, pp. 1-8. Santorini-Hellas (2009)
Kim, H., Choi, D., Choi, H., Kim, T.: Selective correlation detector for additive spread spectrum watermarking in transform domain. Signal Process. 90(10), 2605–2610 (2010)
Deng, C., Wang, S., Sun, H., Cao, H.: Multiplicative spread spectrum watermarks detection performance analysis in curvelet domain. In: Proceedings of the International Conference on E-Business and Information System Security, pp. 1–4. Wuhan (2009)
Cheng, Q.: Generalized embedding of multiplicative watermarks. IEEE Trans. Circuits Syst. Video Technol. 19(7), 978–988 (2009)
Pérez-González, F., Mosquera, C.: Quantization-based data hiding robust to linear-time-invariant filtering. IEEE Trans. Forensics Secur. 3(2), 137–152 (2008)
Jin, C., Su, T., Pan, L.: Multiple digital watermarking scheme based on ICA. In: Proceedings of the 8th International Workshop on Image Analysis for Multimedia Interactive Services, pp. 70–73. Santorini (2007)
Zhang, F., Zhang, X.: Performance evaluation of multiple watermarks system. In: Proceedings of the 2nd Workshop on Digital Media and Its Application in Museum & Heritage, pp. 15–18. Chongqing (2007)
Lu, C., Hsu, C.: Near-optimal watermark estimation and its countermeasure: antidisclosure watermark for multiple watermark embedding. IEEE Trans. Circuits Syst. Video Technol.17(4), 454–467 (2007)
Takahashi, A., Nishimura, R., Suzuki, Y.: Multiple watermarks for stereo audio signals using phase-modulation techniques. IEEE Trans. Signal Process. 53(2), 806–815 (2005)
Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Comput. Electr. Eng. 36(1), 578–584 (2010)
Wang, J., Lian, S.: On the hybrid multi-watermarking. Signal Process. 92(4), 893–904 (2012)
Namuduri, V., Pandit, S., Kothinti, K., Namuduri, K.: A framework for estimating the capacity of multi-channel digital image watermarking. In: Proceedings of the 41st Annual Conference on Information Sciences and Systems, pp. 900–904 (2007)
Hernández, J.R., Amado, M., Pérez-González, F.: DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans. Image Process. 9(1), 55–68 (2000)
Li, Z., Kwong, S., Choy, M., Xiao, W., Zhen, J., Zhang, J.: An intelligent watermark detection decoder based on independent component analysis. In: Kalker, T., et al. (eds.) International Workshop on Digital Watermarking, pp. 223-234. LNCS 2939, Seoul (2003)
Xiao, J., Wang, Y.: Multiple watermarking with side information. In: Kim, H.J., Katzenbeisser, S., Ho, A.T.S. (eds.) International Workshop on Digital Watermarking 2008, p. 379C387. LNCS 5450, Springer, Busan (2009)
Senda, K., Kawamura, M.: Statistical-mechanical approach for multiple watermarks using spectrum spreading. In: Kurosawa, K. (ed.) The 2009 4th International Conference on Information Theoretic Security, p. 231C247. LNCS 5973, Springer, Shizuoka (2010)
Wang, J., Liu, G., Dai, Y., Sun, J., Wang, Z., Lian, S.: Locally optimum detection for Barni’s multiplicative watermarking in DWT domain. Signal Process. 88(1), 117–130 (2008)
Barni, M., Bartolini, F., Rosa, A., Piva, A.: Capacity of full frame DCT image watermarks. IEEE Trans. Image Process. 9(8), 1450–1455 (2000)
Lian, S.: Multimedia Content Encryption: Techniques and Applications. Auerbach Publication, London (2008)
Lewis, A., Knowles, G.: Image compression using the 2-D wavelet transform. IEEE Trans. Image Process. 1(2), 244–250 (1992)
Petitcolas, F.: Stirmark benchmark, http://www.petitcolas.net/fabien/watermarking/stirmark/ (2002)
Acknowledgments
This work was jointly supported by the National Natural Science Foundation of China (Grant No.61272421, 61103141, 61232016, 61173141), the Natural Science Foundation of Jiangsu Higher Education Institutions of China (Grant No.12KJB520006) and the Priority Academic Program Development of Jiangsu Higher Education Institutions.
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by C. Xu.
Rights and permissions
About this article
Cite this article
Wang, J., Lian, S. & Wang, J. Hybrid additive multi-watermarking and decoding. Multimedia Systems 21, 345–361 (2015). https://doi.org/10.1007/s00530-013-0338-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-013-0338-9