Advertisement

Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter

  • Bingbing XiaEmail author
  • Xianfeng Zhao
  • Dengguo Feng
  • Mingsheng Wang
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8948)

Abstract

Spread spectrum watermarking security can be evaluated via mutual information. In this paper, we present a new method to reduce mutual information by embedding watermark in the key controlled wavelet domain. Theoretical analysis shows that the watermark signals are diffused and its energy is weakened when they are evaluated from the attacker’s observation domain, and it can lead to higher document-to-watermark energy ratio and better watermark security without losing robustness. Practical algorithms of security tests using optimal estimators are also applied and the performance of the estimators in the observation domain is studied. Besides, we also present a novel method of calculating the key controlled wavelet filter, and give both numerical and analytical implementations. Experiment results show that this method provides more valid parameters than existing methods.

Keywords

Watermarking security Spread spectrum Key controlled wavelet Parameterizations Mutual information 

Notes

Acknowledgments

This work was supported by the NSF of China under 61170281, NSF of Beijing under 4112063, Strategic and Pilot Project of CAS under XDA06030601, and the Project of IIE, CAS, under Y1Z0041101 and Y1Z0051101.

References

  1. 1.
    Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Sig. Process. 83(10), 2069–2084 (2003)CrossRefzbMATHGoogle Scholar
  2. 2.
    Cayre, F., Fontaine, C., Furon, T.: Watermarking security: theory and practice. IEEE Trans. Sig. Process. 53(10, pt. 2), 3976–3987 (2005)CrossRefMathSciNetGoogle Scholar
  3. 3.
    Cox, D.A., Little, J.B., O’Shea, D.: Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra. Springer, New York (1997)Google Scholar
  4. 4.
    Cox, I.J., Killian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  5. 5.
    Daubechies, I.: Ten Lectures on Wavelets. CBMS-NSF Series in Applied Mathematics, vol. 61. SIAM Press, Philadelphia (1992)CrossRefzbMATHGoogle Scholar
  6. 6.
    Dietl, W., Meerwald, P., Uhl, A.: Protection of wavelet-based watermarking systems using filter parametrization. Sig. Process. 83, 2095–2116 (2003)CrossRefzbMATHGoogle Scholar
  7. 7.
    Doerr, G., Dugelay, J.L.: Danger of low-dimensional watermarking subspaces. In: Proceedings Iof the EEE International Conference on Acoustics, Speech, Signal Processing, Montreal, QC, Canada, vol. 3, pp. 93–96 (2004)Google Scholar
  8. 8.
    Freire, L.P.: Digital watermarking security. Ph.D. dissertation, Department of Signal Theory and Communications, University of Vigo, Vigo, Spain (2008)Google Scholar
  9. 9.
    Freire, L.P., González, F.P.: Spread-spectrum watermarking security. IEEE Trans. Inf. Forensics Secur. 4(1), 2–24 (2009)CrossRefGoogle Scholar
  10. 10.
    Hyvärinen, A.: Fast and robust fixed-point algorithms for independent component analysis. IEEE Trans. Neural Netw. 10(3), 626–634 (1999)CrossRefGoogle Scholar
  11. 11.
    Kalker, T.: Considerations on watermarking security, In: Proceedings of the IEEE International Workshop on Multimedia Signal Processing, Cannes, France, pp. 201–206 (2001)Google Scholar
  12. 12.
    Malvar, H.S., Florêncio, D.A.F.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Sig. Process. 51(4), 898–905 (2003)CrossRefGoogle Scholar
  13. 13.
    Moulin, P., Ivanovic, A.: The zero-rate spread-spectrum watermarking game. IEEE Trans. Sig. Process. 51(4), 1098–1117 (2003)CrossRefMathSciNetGoogle Scholar
  14. 14.
    Oja, E., Hyvärinen, A., Karhunen, J.: Independent Component Analysis. Adaptive and Learning Systems for Signal Processing, Communications and Control. Wiley, New York (2001)Google Scholar
  15. 15.
    Phillips, W.J.: Wavelets and Filter Banks Course Note (2003). http://www.engmath.dal.ca/courses/engm6610/notes/notes.html
  16. 16.
    Regensburger, G.: Parametrizing compactly supported orthonormal wavelets by discrete moments. Applicable Algebra in Engineering, Communication and Computing (2007). http://www.ricam.oeaw.ac.at/people/page/regensburger/papers/regensburger06.pdf
  17. 17.
    Schneid, J., Pittner, S.: On the parametrization of the coeffcients of dilation equations for compactly supported wavelets. Computing 51, 165–173 (1993)CrossRefzbMATHMathSciNetGoogle Scholar
  18. 18.
    Wang, X.Y., Wu, J.: A feature-based robust digital image watermarking against desynchronization attacks. Int. J. Autom. Comput. 4(4), 428–432 (2007). SpringerCrossRefGoogle Scholar
  19. 19.
    Zou, H., Tewfik, A.H.: Parametrization of compactly supported orthonormal wavelets. IEEE Trans. Sig. Process. 41, 1423–1431 (1993)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  • Bingbing Xia
    • 1
    Email author
  • Xianfeng Zhao
    • 1
  • Dengguo Feng
    • 1
  • Mingsheng Wang
    • 1
  1. 1.State Key Laboratory of Information SecurityInstitute of Information Engineering, Chinese Academy of SciencesBeijingPeople’s Republic of China

Personalised recommendations