Document Type : Review Article

Authors

Mahshahr Islamic Azad Univeraity

Abstract

 This paper presents a simple watermarking approach based on the rotation of low frequency components in image blocks. The rotation process is performed with less distortion by projecting the samples on specific lines according to their message bit. To optimize the detection, the Maximum Likelihood criteria have been used. Thus by computing the distribution of rotated noisy samples, the optimum decoder is presented and its performance is analytically investigated. The privilege of this proposed algorithm is its inherent robustness against gain attack as well as its simplicity. Experimental results confirm the validity of the analytical derivations and also its high robustness against common attacks.     

Keywords

[1] Chun-Shien Lu , Multimedia security: steganography and digital watermarking techniques for protection of intellectual property , Idea Group Publishing.
[2] F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, “Information Hiding—A Survey,” Proc. IEEE, vol. 87, no. 7, 1999, pp. 1062–1078.
[3] Cox , I.J. , Miller , M.L. , & Bloom , J.A. (2002). Digital watermarking (1st ed.). San Francisco: Morgan Kaufmann.
[4] J. Seitz, Digital watermarking for digital media, Information Science Publishing, 2005.
[5] A. Ker, “Improved detection of LSB steganography in grayscale images,” in Proc. Information Hiding Workshop, vol. 3200, Springer LNCS, 2004, pp. 97–115.
[6] J.Mielikainen, “LSB matching Revisited”, IEEE signal processing letters, Vol. 13, No. 5, May 2006.
[7] B. Chen and G. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
[8] J. J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, “Scalar costa scheme for information embedding, ” IEEE Trans. Signal Process., vol. 4, no. 51, pp. 1003-1019, Apr. 2003.
[9] Q. Zhang, and N. Boston, “Quantization index modulation using E8 lattice”, in Proc. 41th Annual Allerton Conf. on Communication, Control and Computing, Allerton, IL, USA, 2003.
[10] I. K. Yeo and H. J. Kim, “Modified patchwork algorithm: A novel audio watermarking scheme,” IEEE Trans. Speech Audio Process., vol. 11, no. 4, pp. 381–386, Jul. 2003.
[11] I. K. Yeo, H. J. Kim “Generalized patchwork algorithm for image watermarking,” Multimedia Syst. vol. 9, no. 3, pp. 261-265, 2003
[12] J. J. Eggers, R. Bauml, and B. Girod, “Estimation of amplitude modifications before SCS watermark detection,” in Proc. SPIE Security Multimedia Content P. W. Wong and E. J. Delp, Eds. San Jose, CA, Jan. 2002, vol. 4675, pp. 387-398.
[13] J. H. Conway and N. J. A. Sloane, Sphere Packing, Lattices, and Groups. New York: Springer-Verlag, 1998.
[14] M. L. Miller, G. J. Doerr, and I. J. Cox, “Applying informed coding and embedding to design robust, high capacity, watermark,” IEEE Trans. Image Process., vol. 13, no. 16, pp. 792-807, June, 2004.
[15] C. Chen, and X. Wu, “An angel QIM watermarking based on Watson perceptual model,” in Proc. International Conference on Image and Graphics, Chengdu, Sichuan, China, 2007.
[16] F. Ourique, and F. Perez-Gonzalez, “Angel QIM: A novel watermarking embedding scheme robust against amplitude scaling distortion,” in Proc. ICASSP 2005, vol. II, pp.797-800, 2005.
[17] F. Perz-Gonzalez, C. Mosquera, M. Barni, and A. Abrado, “Rational dither modulation: A high rate data-hiding method invariant to gain attacks,” IEEE Trams. Signal Process. vol. 53, no. 10, pp. 3960-3975, Oct. 2005.
[18] Z. Wang and A.C. Bovik, “Image Quality Assessment: From Error Visibility to Structural Similarity,” IEEE Trans. on Image Process., vol. 13, no. 4, pp. 600–612, 2004.
[19] Z. Wang and A.C. Bovik, “A universal image quality index,” IEEE Signal Processing Letters, vol. 9, no. 3, pp. 81–84, 2002.
[20] M. A. Akhaee, S. M. E. Sahraeian, B. Sankur, and F. Marvasti, “Robust Scaling Based Image Watermarking Using Maximum Likelihood Decoder with Optimum Strength Factor,” IEEE Trans. on Multimedia, vol. 11, no.4, pp. 431-444, Aug, 2009.
[21] Gembicki , F. , and Haimes , Y.: `Approach to performance and sensitivity multiob-jective optimization: The goal attainment method' , IEEE Transactions on Automatic Control , 1975 , 20 , (6) , pp. 769-771.
[22] Y. Wang, J.F. Doherty, and R.E. Van Dyck, “A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images,” IEEE Transactions on Image Processing, vol. 11, no. 2, pp. 77–88, 2002.