Elsevier

Information Sciences

Volume 316, 20 September 2015, Pages 40-53
Information Sciences

An improved AQIM watermarking method with minimum-distortion angle quantization and amplitude projection strategy

https://doi.org/10.1016/j.ins.2015.04.029Get rights and content

Abstract

About ten years ago, angle QIM (AQIM) was proposed by Ourique et al. for the purpose of resisting gain attacks. Later, to improve AQIM, Nezhadarya et al. proposed absolute AQIM (AAQIM) and further applied AAQIM to their gradient-based watermarking framework. Both of AQIM and AAQIM have the ability, in principle, to resist gain attacks, but neither of them can achieve optimal performance in terms of angular distortion. In this paper, we propose an improved AQIM watermarking method (IAQIM) with minimum-distortion angle quantization and amplitude projection strategy. IAQIM can not only obtain an optimal performance in terms of angular distortion by using the minimum-distortion angle quantization, but also further reduce the embedding distortion of host signals with the amplitude projection strategy. A theoretical analysis is presented for the performance of the proposed method. Experiments have been conducted to validate the theoretical analysis and to demonstrate the superiority of the proposed IAQIM watermarking method over the existing gain-invariant watermarking methods, including AQIM and AAQIM.

Introduction

Since Chen and Wornell [7] modeled the digital watermarking as communications with side information, great attention has been paid to quantization index modulation (QIM) watermarking methods, in which the amplitude of a host signal is quantized using one of a series of quantizers. Such methods are completely host-interference-free, and thus yield larger watermarking capacity than the spread-spectrum-based methods [4], [9]. However, the conventional QIM methods are highly vulnerable to gain attacks (i.e., valumetric distortion), such as amplitude scaling and gamma compensation. These attacks may not degrade the quality of multimedia contents, but can cause an evident increase of the bit error rate (BER)1 in watermark extraction.

So far, several strategies have been proposed to resist gain attacks, including the use of pilot sequence [24], the construction of the embedding domain being invariant to the gain attacks [1], [10], [11], [22], [27], [28], [29], and the design of direction-based embedding algorithms, such as angle QIM (AQIM) [18], absolute AQIM (AAQIM) [15], and sample projection approach (SPA) [2]. However, the method using pilot signal [24] is very vulnerable to the malicious attacks that can remove the pilot signal. The methods based on rational dither modulation (RDM) [1], [10], [22] have the problem of high computational complexity and high peak-to-average power ratio. Logarithmic QIM (LQIM) [11] employs a logarithmic function to improve the perceptual quality of watermarked signal. However, it is not very robust against additive white Gaussian noise (AWGN) attack. The normalized correlation based dither modulation (NC-DM) method [29] embeds watermarks by quantizing the normalized cross correlation between the host signal vector and a random vector. However, like the spread transform dither modulation (STDM) scheme [7], the random vector must be sent to the decoder, which introduces additional information and thus decreases the security of the method. In [27], [28], the method, named as amplitude ratio QIM (ARQIM), embeds one watermark bit into the ratio of the amplitudes of the two vectors formed by a number of signal samples. ARQIM achieves good robustness at a low embedding rate. But, the robustness of ARQIM degrades sharply with the increase of its embedding rate. AQIM [18] is the earliest one of the direction-based embedding methods. In the AQIM watermarking, the angle of a host vector is quantized, while its magnitude remains unchanged. Thus the AQIM watermarking is essentially invariant to gain attacks. However, the angular distortion of AQIM is not minimized. Later, to improve AQIM, AAQIM [15] was proposed by quantizing the absolute value of the angle of the host vector instead of the angle itself. But the angle quantization of AAQIM still does not obtain optimal performance in terms of angular distortion. In [2], Akhaee et al. proposed a watermarking method called sample projection approach (SPA), which is a new kind of direction-based embedding methods and thus is also essentially invariant to the gain attacks. However, SPA has two main drawbacks: first, the codelines of SPA are suboptimal in terms of the embedding distortion; second, its embedding domain is vulnerable to the AWGN attack.

This paper focuses on studying the direction-based embedding methods. By analyzing AQIM and AAQIM, we have found that both AQIM and AAQIM have the problem of non-optimal quantization, and AAQIM also introduces extra embedding distortion. To order to solve the problems with AQIM and AAQIM, we propose an improved AQIM method, which introduces a new quantization function that can achieve the optimal performance in terms of angular distortion. Moreover, inspired by [2], the improved AQIM (IAQIM) uses an amplitude projection strategy instead of the amplitude rotation strategy of AQIM to further reduce the embedding distortion of host signals. Then, we present a theoretical analysis on the DWR and BER of the proposed method. The analytical results show that the proposed IAQIM method yields much lower embedding distortion than AQIM and AAQIM. The extensive experiments conducted on both simulated signals and real images show that the IAQIM water-marking method outperforms the existing methods in terms of robustness against various attacks.

The paper is organized as follows. In Section 2, we provide a review and analysis for the AQIM and AAQIM methods. The detailed description of the proposed IAQIM method is presented in Section 3. Section 4 provides a theoretical analysis on the performance of the IAQIM method, which includes the analysis of DWR and BER. Section 5 shows the experimental results, followed by the summary of the paper in Section 6.

Section snippets

Review and analysis of angle QIM

Without loss of generality, we consider the case of binary message embedding, i.e., the embedding of the binary alphabet M={0,1}. The conventional QIM methods embed message by modulating the host signal x to its closest quantization reconstruction point (i.e., codeword) corresponding to the hidden message m (mM), as shown in Fig. 1. We denote Δ as quantization step, which is used to trade-off between the robustness and the embedding distortion. In general, Δ may take arbitrary positive real

Improved AQIM

We improve AQIM with two strategies, which are described in detail below.

Performance analysis

In this section, we theoretically analyze the performance of the IAQIM method in terms of the embedding distortion (DWR) and the robustness (BER), respectively, by modeling the host signals as i.i.d. Gaussian signals.

Experimental results

Experiments have been carried out to evaluate the performance of the proposed IAQIM method. Our experiments consist of the following two parts.

Conclusions

In this paper, we have proposed an improved version of angle QIM (AQIM) watermarking method, which is essentially invariant to gain attacks. The proposed method, called IAQIM, improves AQIM in two ways, namely, the design of minimum-distortion angle quantization and the use of amplitude projection strategy. We have also presented the theoretical analysis of DWR and BER for the proposed IAQIM method. It should be pointed out that neither authors of AQIM [18] and AAQIM [15] have carried out the

Acknowledgments

The authors are very grateful to the anonymous reviewers for their valuable comments, and also to Prof. F. Perez-Gonzalez for his encouragement and discussion on this work. This work has been supported by NSFC (61003297, U1135001 and 61300208), the NSF of Guangdong Province (2014A030310112 and S2013010011806), the China Postdoctoral Science Foundation Project (2012M520734), the Knowledge Innovation Program of Shenzhen (JCYJ20130401170306848 and JCYJ20130329154017293), and the Shenzhen Peacock

References (29)

  • P. Guccione et al.

    Hyperbolic rdm for nonlinear valumetric distortions

    IEEE Trans. Inf. Forensics Secur.

    (2009)
  • N.K. Khademi et al.

    A logarithmic quantization index modulation for perceptually better data hiding

    IEEE Trans. Image Process.

    (2010)
  • M.K. Mihcak et al.

    Low complexity image modeling based on statistical modeling of wavelet coefficients

    IEEE Signal Process. Lett.

    (1999)
  • P. Moulin et al.

    Data-hiding codes

    Proc. IEEE

    (2005)
  • Cited by (10)

    • An improved robust image watermarking method using DCT and YCoCg-R color space

      2017, Optik
      Citation Excerpt :

      In the last stage, a watermark 256 bits (16 × 16) length is embedded in the Lena host image and then the robustness of the proposed method in Table 12 and Fig. 9 with [8] and in Table 12 and Fig. 10 with [9] are compared. PSNR value in our proposed method, [8,9] are 44, 42 and 43 respectively. As can be seen in Table 5, our proposed method, in addition to having high imperceptibility, has better robustness than two other methods except AWGN.

    • Reversible data hiding with contrast enhancement and tamper localization for medical images

      2017, Information Sciences
      Citation Excerpt :

      Over the past few decades, the transmission of secret data and authentication of digital media have been accomplished by widespread use of information-hiding technologies [2,7,19,31,34–36].

    • Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels

      2020, IEEE Transactions on Circuits and Systems for Video Technology
    • Sample Projection Watermarking Improvement Using the Increasing of Samples in Wavelet Domain

      2019, ICEE 2019 - 27th Iranian Conference on Electrical Engineering
    View all citing articles on Scopus
    View full text