Watermarking Algorithm Based on Informed Coding and Informed Embedding

Article Preview

Abstract:

Informed coding and informed embedding have received considerable attention as a method of digital watermarking with side information in resent years. We designed a new type of codes called structured dirty-paper trellis in which each message is replaced by amount of alternative vectors. This method is very efficient to prevent brightness scaling. A Viterbi decoder is used in the detecting part to find out the highest correlation path. The correct message will be detected no mater how the brightness has been changed for it has no relativity with brightness. In embedding part, watermarking message is adapted by SNR. The original image is divided into several blocks which are transformed by DCT and the adaptive parameter is calculated based on SNR for each block, then watermarking components with different strength are inserted into some middle-frequency coefficients. The experimental results demonstrate that the watermarks generated with the proposed algorithm in this paper have good imperceptibility and robustness.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

566-570

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] J. Cox, M. L. Miller, and A. McKellips, Watermarking as communications with side information , Proc. IEEE, 87(7): 1127–1141, (1999).

DOI: 10.1109/5.771068

Google Scholar

[2] B. Chen and G. W. Wornell, An information-theoretic approach to the design of robust digital watermarking systems. IEEE Transactions on Acoustics, Speech, and Signal Processing, (1999).

DOI: 10.1109/icassp.1999.758336

Google Scholar

[3] Jim Chou, S. Sandeep Pradhan, and Kannan Ramchandran. On the duality between distributed source coding and data hiding. Thirty-third Asilomar conference on signals, systems, and computers, 2: 1503–1507, (1999).

DOI: 10.1109/acssc.1999.832000

Google Scholar

[4] J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, Morgan Kaufmann, (2001).

Google Scholar

[5] M. Costa, Writing on dirty paper. IEEE Trans. Inform. Theory, 29: 439–441, (1983).

DOI: 10.1109/tit.1983.1056659

Google Scholar

[6] B. Chen and G. W. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. In Proc. Int. Symp. Inform. Theory (ISIT-2000). (2000).

DOI: 10.1109/isit.2000.866336

Google Scholar

[7] M.L. Miller, I. J. Cox, and J.A. Bloom. Informed embedding: Exploiting image and detector information during watermark insertion. In IEEE International Conference on image Processing, September (2000).

DOI: 10.1109/icip.2000.899260

Google Scholar

[8] A.J. Viterbi. CDMA: principles of spread spectrum communications. Addison Wesley Longman Inc., (1995).

Google Scholar

[9] Ji Wu Huang, Yun Q Shi, Yi Shi. Embedding image watermarks in DC components, [J] IEEE Trans. on Circuits and Systems for Video Technology. 2000 , 10(6) : 974~979.

DOI: 10.1109/76.867936

Google Scholar

[10] Wei Zhenyu, Ngan King N. Spatio-temporal just noticeable distortion profile for grey scale image/video in DCT domain. IEEE Transactions on Circuits and Systems for Video Technology, (2009).

DOI: 10.1109/tcsvt.2009.2013518

Google Scholar

[11] Kutter, M., F. Tanaka. Video-steganography: How to Secretly Embed a Signature in a Picture. Proceedings of the SPIE 3022, Storage and Retrieval for Image and Video Databases V 1997: 518~526.

Google Scholar

[12] Chen T H, Liu S H, Yao H X, et al. Spatial video watermarking based on stability of DC coefficients. Lecture Notes in Computer Science. (2006).

Google Scholar