Abstract
With the rapid development of Internet-based media consuming, the piracy issue becomes urgent, which makes copyright protection a hot research topic. There exist various watermarking methods that are regarded as potential solutions to copyright protection. However, most of watermarking methods have different properties, and the combinatorial method is expected to make use of different methods’ advantages and to get a good tradeoff. In this paper, a novel hybrid watermark embedding rule is proposed to select the general additive embedding rule or the special additive embedding rule securely. The selection is controlled by a secret key, and the watermark is embedded into the Discrete Wavelet Transform (DWT) domain. With respect to the hybrid embedding rule, the novel optimum and locally optimum hybrid additive decoder is proposed, which is based on the minimum Bayesian risk criterion. And simultaneously, the performance of the optimum hybrid decoder is theoretically analyzed, with the DWT coefficients modelled as the generalized Gaussian distribution. Furthermore, the security of the proposed hybrid watermarking scheme is proved higher than that of existing schemes. Finally, empirical experimental results are given to prove the validity of theoretical analysis.
Similar content being viewed by others
References
Lian, S., Liu, Z., Ren, Z., & Wang, H. (2007). Commutative encryption and watermarking in compressed video data. IEEE Transactions on Circuits and Systems for Video Technology, 17(6), 774–778.
Lian, S. (2010). Secure service convergence based on scalable media coding. Telecommunications Systems, 45(1), 21–35.
Lian, S., & Chen, X. (2010). Lightweight secure multimedia distribution based on homomorphic operations. Telecommunications Systems, doi:10.1007/s11235-010-9367-2, Online First.
Liao, K., Lian, S., Guo, Z., & Wang, J. (2010). Efficient information hiding in H.264/AVC video coding. Telecommunications Systems, doi:10.1007/s11235-010-9372-5, Online First.
Akhaee, M., Sahraeian, S., Sankur, B., & Marvasti, F. (2009). Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Transactions on Multimedia, 11(5), 822–833.
Al-Otum, H., & Samara, N. (2010). A robust blind color image watermarking based on wavelet-tree bit host difference selection. Signal Processing, 90(8), 2498–2512.
Zhang, Y., Niu, X., & Zhao, D. (2005). A method of protecting relational databases copyright with cloud watermark. International Journal of Information and Communication Engineering, 1(7), 337–341.
Mairgiotis, A., Galatsanos, N., & Yang, Y. (2008). New additive watermark detectors based on a hierarchical spatially adaptive image model. IEEE Transactions on Information Forensics and Security, 3(1), 29–37.
Kwitt, R., Meerwald, P., & Uhl, A. (2009). Blind DT-CWT domain additive spread spectrum watermark detection. In 16th international conference on digital signal processing, Santorini-Hellas (pp. 1–8).
Kim, H., Choi, D., Choi, H., & Kim, T. (2010). Selective correlation detector for additive spread spectrum watermarking in transform domain. Signal Processing, 90(10), 2605–2610.
Deng, C., Wang, S., Sun, H., & Cao, H. (2009). In Multiplicative spread spectrum watermarks detection performance analysis in curvelet domain. International conference on e-business and information system security, Wuhan, China (pp. 1–4).
Cheng, Q. (2009). Generalized embedding of multiplicative watermarks. IEEE Transactions on Circuits and Systems for Video Technology, 19(7), 978–988.
Pérez-González, F., & Mosquera, C. (2008). Quantization-based data hiding robust to linear-time-invariant filtering. IEEE Transactions on Information Forensics and Security, 3(2), 137–152.
Hernández, J. R., Amado, M., & Pérez-González, F. (2000). DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Transactions on Image Processing, 9(1), 55–68.
Li, Z., Kwong, S., Choy, M., Xiao, W., Zhen, J., & Zhang, J. (2003). An intelligent watermark detection decoder based on independent component analysis. In T. Kalker et al. (Eds.), LNCS: Vol. 2939. International workshop on digital watermarking, Seoul, Korea (pp. 223–234). Berlin: Springer.
Xiao, J., & Wang, Y. (2009). Multiple watermarking with side information. In H. J. Kim, S. Katzenbeisser, & A. T. S. Ho (Eds.) LNCS: Vol. 5450. International workshop on digital watermarking (pp. 379–387). Berlin: Springer.
Senda, K., & Kawamura, M. (2010). Statistical-mechanical approach for multiple watermarks using spectrum spreading. In K. Kurosawa (Ed.) LNCS: Vol. 5973. The 2009 4th international conference on information theoretic security, Shizuoka, Japan (pp. 231–247). Berlin: Springer.
Wang, J., Liu, G., Dai, Y., Sun, J., Wang, Z., & Lian, S. (2008). Locally optimum detection for Barni’s multiplicative watermarking in DWT domain. Signal Processing, 88(1), 117–130.
Barni, M., Bartolini, F., Rosa, A., & Piva, A. (2000). Capacity of full frame DCT image watermarks. IEEE Transactions on Image Processing, 9(8), 1450–1455.
Lian, S. (2008). Multimedia content encryption: techniques and applications. New York: Auerbach Publication, Taylor & Francis Group.
Lewis, A., & Knowles, G. (1992). Image compression using the 2-D wavelet transform. IEEE Transactions on Image Processing, 1(2), 244–250.
Petitcolas, F. (2002). Stirmark Benchmark. http://www.petitcolas.net/fabien/watermarking/stirmark/.
Acknowledgements
This work was jointly supported by NUIST Research Fund (Grant Numbers 20100390 and 20100391) and the Priority Academic Program Development of Jiangsu Higher Education Institutions.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, J., Lian, S., Yan, L. et al. Hybrid additive watermarking and its decoders. Telecommun Syst 54, 305–313 (2013). https://doi.org/10.1007/s11235-013-9735-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-013-9735-9