Abstract
This paper revisits the problem of watermarking a Gaussian host, where the embedder and attacker are subject to mean-squared distortion constraints. The worst (nonadditive) attack and unconstrained capacity have been identified in previous work. Here we constrain the encoding function to lie in a given family of encoding functions — such as spread-spectrum or fixed-dimensional Quantization Index Modulation (QIM), with or without time-sharing, with or without external dithering. This gives rise to the notion of constrained capacity. Several such families are considered in this paper, and the one that is best under the worst attack is identified for each admissible value of the watermark-to-noise ratio (WNR) and the noise-to-host ratio (NHR). With suitable improvements, even scalar QIM can outperform any (improved) spread-spectrum scheme, for any value of WNR and NHR. The remaining gap to unconstrained capacity can be bridged using higher-dimensional lattice QIM.
This work was supported by NSF under grant CCR 03-25924.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Trans. on Information Theory 47(4), 1423–1443 (2001)
Eggers, J.J., Bäuml, R., Tzschoppe, R., Girod, B.: Scalar Costa Scheme for Information Embedding. IEEE Transactions on Signal Processing 51(4), 1003–1019 (2003)
Zamir, R., Shamai (Shitz), S., Erez, U.: Nested Linear/Lattice Codes for Structured Multiterminal Binning. IEEE Trans. Information Theory 48(6), 1250–1276 (2002)
Erez, U., Zamir, R.: Achieving \(\frac{1}{2} \log(1+SNR)\) on the AWGN Channel with Lattice Encoding and Decoding. IEEE Trans. on Information Theory 50, 2293–2314 (2004)
Erez, U., ten Brink, S.: Approaching the dirty paper limit for canceling known interference. In: Proc. Allerton Conf., Monticello, IL (September 2003)
Koval, O., Voloshynovskiy, S., Pérez-González, F.: Quantization-Based Watermarking Performance Improvement Using Host Statistics: AWGN Attack Case. In: Proc. ACM Multimedia and Security Workshop, Magdeburg, Germany (September 2004)
Pérez-Freire, L., Pérez-González, F., Voloshynovskiy, S.: Revealing the True Achievable Rates of Scalar Costa Scheme. In: Proc. IEEE Multimedia Signal Proc. Workshop, Siena, Italy, September-October (2004)
Pérez-Freire, L., Pérez-González, F.: Spread-Spectrum vs Quantization-Based Data Hiding: Misconceptions and Implications. In: Proc. SPIE, San Jose, CA (January 2005)
Cox, I.J., Killian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. Image Proc. 6(12), 1673–1687 (1997)
O’Sullivan, J.A., Moulin, P., Ettinger, M.: Information Theoretic Analysis of Steganography. In: Proc. Int. Symp. on Information Theory (ISIT 1998), Boston, MA (August 1998)
Moulin, P., O’Sullivan, J.A.: Information–Theoretic Analysis of Information Hiding. IEEE Trans. on Information Theory 49(3), 563–593 (2003)
Moulin, P., Mıhçak, M.K.: The Parallel-Gaussian Watermarking Game. IEEE Trans. on Information Theory 50(2), 272–289 (2004)
Moulin, P., Mıhçak, M.K.: A Framework for Evaluating the Data-Hiding Capacity of Image Sources. IEEE Trans. on Image Processing 11(9), 1029–1042 (2002)
Mıhçak, M.K., Moulin, P.: Information-Embedding Codes Matched to Local Gaussian Image Models. In: Proc. IEEE Int. Conf. on Image Processing, Rochester, NY (September 2002)
Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley, Chichester (1991)
Moulin, P., Ivanović, A.: Game-Theoretic Analysis of Watermark Detection. In: Proc. IEEE Int. Conf. on Image Processing, Thessaloniki, Greece (October 2001)
Moulin, P., Ivanović, A.: The Zero-Rate Spread-Spectrum Watermarking Game. IEEE Trans. on Signal Processing 51(4), 1098–1117 (2003)
Malvar, H., Florêncio, D.: Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking. IEEE Trans. Signal Processing 51(4), 898–905 (2003)
Willems, F.M.J.: On Gaussian Channels with Side Information at the Transmitter. In: Proc. 9th Symp. on Information Theory in the Benelux, Enschede, The Netherlands, May 1988, pp. 129–135 (1988)
Liu, T., Moulin, P.: Error exponents for watermarking game with squared-error constraints. In: Proc. Int. Symp. Information Theory, Yokohama, Japan (July 2003)
Costa, M.: Writing on Dirty Paper. IEEE Trans. on Information Theory 29(3), 439–441 (1983)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Moulin, P., Wang, Y. (2005). Improved QIM Strategies for Gaussian Watermarking. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_29
Download citation
DOI: https://doi.org/10.1007/11551492_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28768-1
Online ISBN: 978-3-540-32052-4
eBook Packages: Computer ScienceComputer Science (R0)