Skip to main content

Advertisement

Log in

Condition for energy efficient watermarking without WSS assumption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Energy efficient watermarking preserves the watermark energy after linear attack as much as possible. We consider in this paper the non-stationary signal models and derive conditions for energy efficient watermarking under random vector model without wide sense stationary (WSS) assumption. We find that the covariance matrix of the energy efficient watermark should be proportional to the host covariance matrix to best resist the optimal linear removal attacks. For WSS process model, our result reduces to the well-known power spectrum condition. Intuitive geometric interpretations of the results in Hilbert space of random vectors are discussed, which also provides us simpler proof of the main results. Practical implementation of the covariance matrix shaped watermark for speech signal using linear prediction analysis (LPA) and image signal using eigen-value decomposition (EVD) are also presented and tested, showing improved performance as compared to lowpass and Su’s global watermark.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Notes

  1. This is usually referred to as PCA (principal component analysis).

  2. KLT is based on EVD of the true covariance matrix while PCA is based on EVD of the sample covariance matrix [30].

  3. It is not difficult to show that after transforming the host using T  − 1, the covariance matrix will be I, an identity matrix. A diagonal covariance matrix indicates uncorrelation between components of a random vector, hence the name whitening transform.

References

  1. Balado F, Whelan KM, Silvestre GCM, Hurley NJ (2005) Joint iterative decoding and estimation for side-informed data hiding. IEEE Trans Signal Process 53:4006–4019. doi:10.1109/TSP.2005.855412

    Article  MathSciNet  Google Scholar 

  2. Barni J, Bartolini F (2004) Watermarking systems engineering: enabling digital assets security and other applications. Marcel Dekker Inc.

  3. Celik M, Sharma G, Tekalp AM (2005) Pitch and duration modification for speech watermarking. In: Proceedings of the 2005 IEEE international conference on acoustics, speech, and signal processing (ICASSP05)

  4. Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423–1443

    Article  MATH  MathSciNet  Google Scholar 

  5. Cheng Q, Sorensen S (2001) Spread spectrum signaling for speech watermarking. In: IEEE international conference on acoustics, speech and signal processing, vol 3, pp 1337–1340

  6. Cheng Q, Sorensen S (2005) Spread spectrum signaling for speech watermarking. United States Patent, No. US6892175B1

  7. Chu WC (2003) Speech coding algorithms: foundation and evolution of standardized coders. Wiley-Interscience, New Jersey

    Book  Google Scholar 

  8. Coumou DJ, Sharma G (2006) Watermark synchronization for feature-based embedding: application to speech. In: IEEE international conference on multimedia and expo, pp 849–852

  9. Coumou DJ, Sharma G (2008) Insertion, deletion codes with feature-based embedding: a new paradigm for watermark synchronization with applications to speech watermarking. IEEE T Inf Foren Sec 3(2):153–165. http://www.ece.rochester.edu/~gsharma/papers/CoumouWMSyncTIFSJun08.pdf

    Article  Google Scholar 

  10. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco, CA

    Google Scholar 

  11. Cox IJ, Miller ML, McKellips AL (1999) Watermarking as communication with side information. Proc IEEE 87(7):1127–1141

    Article  Google Scholar 

  12. Deller JR, Hansen JHL, Proakis JG (1993) Discrete-time processing of speech signals. IEEE Press

  13. Dietl G (2007) Linear estimation and detection in Krylov subspaces. Springer

  14. Gang L, Akansu AN, Ramkumar M (2002) Security and synchronization in watermark sequence. In: Proceedings of IEEE international conference on acoustics, speech, and signal processing, vol 4, pp 3736–3739. Orlando, Florida, USA

  15. Gerbrands JJ (1981) On the relationships between SVD, KLT and PCA. Pattern Recogn 14(1C6):375–381

    Article  MATH  MathSciNet  Google Scholar 

  16. Gray RM (2005) Toeplitz and circulant matrices: a review. Commun Inf Theory 2:155–239

    Google Scholar 

  17. Hofbauer K, Kubin G, Kleijn WB (2009) Speech watermarking for analog flat-fading bandpass channels. IEEE Trans Audio Speech Lang Process 17:1624–1637

    Article  Google Scholar 

  18. Hwang Y, Moon KA, Kim MJ (2002) Watermark design for the Wiener attack and whitening filtered detectioin. In: Proceedings of the SPIE, vol 4675, pp 441–449

  19. Jain AK (1989) Fundamentals of digital image processing. Prentice-Hall Inc., Upper Saddle River, NJ

    MATH  Google Scholar 

  20. Jayant N, Noll P (1984) Digital coding of waveforms: principles and applications to speech and video. Prentice-Hall signal processing series, Prentice-Hall

  21. Jeebananda P, Manish K (2011) Application of energy efficient watermark on audio signal for authentication. In: 2011 international conference on computational intelligence and communication networks (CICN), pp 202–206

  22. Kay S (1993) Fundamentals of statistical signal processing: estimation theory. Prentice Hall

  23. Kay S (1998) Fundamentals of statistical signal processing: detection theory. Prentice Hall

  24. Kay SM (1988) Modern spectral estimation: theory and application. Prentice-Hall, Englewood Cliffs, NJ

    MATH  Google Scholar 

  25. Kejariwal A, Gupta S, Nicolau A, Dutt ND, Gupta RK (2006) Energy efficient watermarking on mobile devices using proxy-based partitioning. IEEE Trans Very Large Scale Integr (VLSI) Syst 14(6):625–636

    Article  Google Scholar 

  26. Lee LT (2009) An energy efficient and high security watermarking algorithm based on DS-CDMA. Master’s thesis, National Taiwan University of Science and Technology

  27. Luenberger DG (1997) Optimization by vector space methods. Wiley-Interscience

  28. Moulin P, Ivanovic A, Ivanovic A (2001) Game-theoretic analysis of watermark detection. In: IEEE int. conf. on image processing. Thessaloniki

  29. Moulin P, Oapos Sullivan JA (2003) Information-theoretic analysis of information hiding. IEEE Trans Inf Theory 49(3):563–593

    Article  MATH  Google Scholar 

  30. Orfanidi SJ (2007) SVD, PCA, KLT, CCA, and all that. Online. http://www.ece.rutgers.edu/~orfanidi/ece525/svd.pdf

  31. Pai YT, Ruan SJ, Götze J (2005) Energy-efficient watermark algorithm based on pairing mechanism. In: Proc. 9th int. conf. on knowledge-based intelligent information & engineering systems (KES2005), vol 3681, pp 1219–1225. Melbourne, Australia

  32. Painter T, Spanias A (2000) Perceptual coding of digital audio. Proc IEEE 88:451–515

    Article  Google Scholar 

  33. Pateux S, Guelvouit GL (2002) Practical watermarking scheme based on wide spread spectrum and game theory. In: Elsevier: signal processing-image communication, pp 283–296

  34. Perez-Gonzalez F, Balado F, Martin JH (2003) Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Trans Signal Process 51(4):960–980

    Article  MathSciNet  Google Scholar 

  35. Quatieri TF (2002) Discrete-time speech signal processing: principles and practice. Prentice Hall

  36. Sadasivam S, Moulin P, Coleman TP (2011) A message-passing approach to combating desynchronization attacks. IEEE Trans Info Forensics Security 6(3):894–905

    Article  Google Scholar 

  37. Sakaguchi S, Arai T, Murahara Y (2000) The effect of polarity inversion of speech on human perception and data hiding as an application. In: IEEE international conference on acoustics speech and signal processing, vol 2, pp 917–920

  38. Sanei S, Chambers J (2007) EEG signal processing. John Wiley & Sons. http://books.google.com.hk/books?id=DNZwI7164AoC

  39. Schonemann PH (1985) On the formal differentiation of traces and determinants. Multivariate Behav Res 20(2):113–139

    Article  Google Scholar 

  40. Sequeira A, Kundur D (2001) Communication and information theory in watermarking: a survey. In: Proc. SPIE, pp 216–227

  41. Su JK, Girod B (1999) On the robustness and imperceptibility of digital fingerprints. In: Proceedings of the 1999 IEEE international conference on multimedia computing and systems, pp 530–535

  42. Su JK, Girod B (1999) Power spectrum condition for energy-efficient watermarking. In: Proceedings of the 1999 International Conference on Image Processing (ICIP-99), pp 301–305

  43. Su JK, Girod B (2002) Power-spectrum condition for energy-efficient watermarking. IEEE Trans Multimedia 4(4):551–560

    Article  Google Scholar 

  44. Tsiatis AA (2006) Semiparametric theory and missing data. Springer Science Business Media

  45. Wang H, Wang W, Chen M, Yao X (2011) Quality-driven secure audio transmissions in wireless multimedia sensor networks. Multimed Tools Appl 1–17. doi:10.1007/s11042-011-0928-5

  46. Yan B, Guo YJ (2011) Hidden information rate of information hiding system based on spread spectrum with covariance matrix shaping. ICIC-EL 5(7):2179–2184

    MathSciNet  Google Scholar 

  47. Yan B, Guo YJ, Wang XM (2010) Performance of spread spectrum watermarking in autoregressive host model under additive white gaussian noise channel. Journal of Measurement Science and Instrumentation 1(3):271–275

    Google Scholar 

  48. Yan B, Guo YJ, Wang XM (2011) Capacity of additive colored noise watermarking channel with perceptual distortion measure. In: Proceeding of 1st international conference on pervasive computing signal processing and applications, pp 1009–1012

  49. Yan B, Lu ZM, Sun SH (2006) Security of autoregressive speech watermarking model under guessing attack. IEEE T Inf Foren Sec 1(3):386–390

    Article  Google Scholar 

  50. Yan B, Lu ZM, Sun SH (2007) Spectrum shaped dither modulation watermarking for correlated host signal. In: IEEE international conference on multimedia and expo, vol 1, pp 1227–1230

  51. Zue V, Seneff S, Glass J (1990) Speech database development at MIT: TIMIT and beyond. Speech Commun 9(4):351–356

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the project of National Natural Science Foundation of China (NSFC) under project grant number: 61272432 . The work of Bin Yan is also supported by Qingdao science and technology development plan (No. 12-1-4-6-(10)-jch). The work of Yin-Jing Guo is supported by the project of NSFC under project grant number: 61071087, and the natural science foundation of Shandong province(ZR2011FM018). The work of Xiao-Feng Liu is supported by the project of NSFC under project grant number: 60905060. The authors would like to thank the anonymous reviewers for their constructive comments and suggestions. We are indebted to the reviewers for their valuable time spent on the manuscript of this paper. The first author would like to thank Prof. Zhe-Ming Lu, Prof. Sheng-He Sun, Prof. Jeng-Shyang Pan and Prof. Xia-Mu Niu for their guidance and help. Their insight in watermarking research have significant influence on this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bin Yan.

Appendix

Appendix

To prove the result in (17), we note that

$$ \mathbb{E} \left( \hat{\mathbf{w}}^T \hat{\mathbf{w}}\right) = \mathrm{tr} \left[ \mathbb{E} \left( \hat{\mathbf{w}} \hat{\mathbf{w}}^T\right) \right] $$
(61)
$$ = \mathrm{tr} \left\{\mathbb{E} \left[ \mathbf{H\left(x+w\right)}\left(\mathbf{x}^T +\mathbf{w}^T\right)\mathbf{H}^T \right] \right\} $$
(62)
$$ = \mathrm{tr} \left[ \mathbf{HC_x}\mathbf{H}^T + \mathbf{HC_w}\mathbf{H}^T\right],\label{eq_corr_EstWm_EstWm} $$
(63)

where we have used the fact that x and w are independent. Substituting into (63) the expression for Wiener filter \(\mathbf{H} = \mathbf{C_w \left(C_x+C_w \right)^{-1}}\), we have

$$ \mathbb{E} \left( \hat{\mathbf{w}}^T \hat{\mathbf{w}}\right) = \mathrm{tr} \left[ \mathbf{HC_x}\mathbf{H}^T + \mathbf{HC_w}\mathbf{H}^T\right] $$
(64)
$$ = \mathrm{tr} \left[\mathbf{C_w \left( C_x+C_w\right)^{-1} \left( C_x+C_w\right)\left( C_x+C_w\right)^{-1}C_w} \right] $$
(65)
$$ = \mathrm{tr} \left[\mathbf{C_w} \left( \mathbf{C_x+C_w}\right)^{-1}\mathbf{C_w}\right].\label{eq_corr_EstWm_EstWm_meet} $$
(66)

On the other hand we may obtain

$$ \mathbb{E} \left(\hat{\mathbf{w}}^T \mathbf{w}\right) = \mathrm{tr} \left[ \mathbb{E} \left(\mathbf{w} \hat{\mathbf{w}}^T \right)\right] $$
(67)
$$ = \mathrm{tr} \left\{ \mathbb{E} \left[\mathbf{w} \left(\mathbf{x}^T + \mathbf{w}^T \right)\mathbf{H}^T \right] \right\} $$
(68)
$$ = \mathrm{tr} \left( \mathbf{C_w} \mathbf{H}^T\right) $$
(69)
$$ = \mathrm{tr} \left[ \mathbf{C_w}\left(\mathbf{C_x}+\mathbf{C_w} \right)^{-1}\mathbf{C_w}\right], $$
(70)

which is equal to (66). So we have proved the result in (17).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yan, B., Guo, YJ. & Liu, XF. Condition for energy efficient watermarking without WSS assumption. Multimed Tools Appl 71, 1499–1528 (2014). https://doi.org/10.1007/s11042-012-1291-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1291-x

Keywords

Navigation