Skip to main content
Log in

Hybrid additive watermarking and its decoders

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

With the rapid development of Internet-based media consuming, the piracy issue becomes urgent, which makes copyright protection a hot research topic. There exist various watermarking methods that are regarded as potential solutions to copyright protection. However, most of watermarking methods have different properties, and the combinatorial method is expected to make use of different methods’ advantages and to get a good tradeoff. In this paper, a novel hybrid watermark embedding rule is proposed to select the general additive embedding rule or the special additive embedding rule securely. The selection is controlled by a secret key, and the watermark is embedded into the Discrete Wavelet Transform (DWT) domain. With respect to the hybrid embedding rule, the novel optimum and locally optimum hybrid additive decoder is proposed, which is based on the minimum Bayesian risk criterion. And simultaneously, the performance of the optimum hybrid decoder is theoretically analyzed, with the DWT coefficients modelled as the generalized Gaussian distribution. Furthermore, the security of the proposed hybrid watermarking scheme is proved higher than that of existing schemes. Finally, empirical experimental results are given to prove the validity of theoretical analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Lian, S., Liu, Z., Ren, Z., & Wang, H. (2007). Commutative encryption and watermarking in compressed video data. IEEE Transactions on Circuits and Systems for Video Technology, 17(6), 774–778.

    Article  Google Scholar 

  2. Lian, S. (2010). Secure service convergence based on scalable media coding. Telecommunications Systems, 45(1), 21–35.

    Article  Google Scholar 

  3. Lian, S., & Chen, X. (2010). Lightweight secure multimedia distribution based on homomorphic operations. Telecommunications Systems, doi:10.1007/s11235-010-9367-2, Online First.

    Google Scholar 

  4. Liao, K., Lian, S., Guo, Z., & Wang, J. (2010). Efficient information hiding in H.264/AVC video coding. Telecommunications Systems, doi:10.1007/s11235-010-9372-5, Online First.

    Google Scholar 

  5. Akhaee, M., Sahraeian, S., Sankur, B., & Marvasti, F. (2009). Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Transactions on Multimedia, 11(5), 822–833.

    Article  Google Scholar 

  6. Al-Otum, H., & Samara, N. (2010). A robust blind color image watermarking based on wavelet-tree bit host difference selection. Signal Processing, 90(8), 2498–2512.

    Article  Google Scholar 

  7. Zhang, Y., Niu, X., & Zhao, D. (2005). A method of protecting relational databases copyright with cloud watermark. International Journal of Information and Communication Engineering, 1(7), 337–341.

    Google Scholar 

  8. Mairgiotis, A., Galatsanos, N., & Yang, Y. (2008). New additive watermark detectors based on a hierarchical spatially adaptive image model. IEEE Transactions on Information Forensics and Security, 3(1), 29–37.

    Article  Google Scholar 

  9. Kwitt, R., Meerwald, P., & Uhl, A. (2009). Blind DT-CWT domain additive spread spectrum watermark detection. In 16th international conference on digital signal processing, Santorini-Hellas (pp. 1–8).

    Google Scholar 

  10. Kim, H., Choi, D., Choi, H., & Kim, T. (2010). Selective correlation detector for additive spread spectrum watermarking in transform domain. Signal Processing, 90(10), 2605–2610.

    Google Scholar 

  11. Deng, C., Wang, S., Sun, H., & Cao, H. (2009). In Multiplicative spread spectrum watermarks detection performance analysis in curvelet domain. International conference on e-business and information system security, Wuhan, China (pp. 1–4).

    Google Scholar 

  12. Cheng, Q. (2009). Generalized embedding of multiplicative watermarks. IEEE Transactions on Circuits and Systems for Video Technology, 19(7), 978–988.

    Article  Google Scholar 

  13. Pérez-González, F., & Mosquera, C. (2008). Quantization-based data hiding robust to linear-time-invariant filtering. IEEE Transactions on Information Forensics and Security, 3(2), 137–152.

    Article  Google Scholar 

  14. Hernández, J. R., Amado, M., & Pérez-González, F. (2000). DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Transactions on Image Processing, 9(1), 55–68.

    Article  Google Scholar 

  15. Li, Z., Kwong, S., Choy, M., Xiao, W., Zhen, J., & Zhang, J. (2003). An intelligent watermark detection decoder based on independent component analysis. In T. Kalker et al. (Eds.), LNCS: Vol. 2939. International workshop on digital watermarking, Seoul, Korea (pp. 223–234). Berlin: Springer.

    Chapter  Google Scholar 

  16. Xiao, J., & Wang, Y. (2009). Multiple watermarking with side information. In H. J. Kim, S. Katzenbeisser, & A. T. S. Ho (Eds.) LNCS: Vol. 5450. International workshop on digital watermarking (pp. 379–387). Berlin: Springer.

    Chapter  Google Scholar 

  17. Senda, K., & Kawamura, M. (2010). Statistical-mechanical approach for multiple watermarks using spectrum spreading. In K. Kurosawa (Ed.) LNCS: Vol. 5973. The 2009 4th international conference on information theoretic security, Shizuoka, Japan (pp. 231–247). Berlin: Springer.

    Google Scholar 

  18. Wang, J., Liu, G., Dai, Y., Sun, J., Wang, Z., & Lian, S. (2008). Locally optimum detection for Barni’s multiplicative watermarking in DWT domain. Signal Processing, 88(1), 117–130.

    Article  Google Scholar 

  19. Barni, M., Bartolini, F., Rosa, A., & Piva, A. (2000). Capacity of full frame DCT image watermarks. IEEE Transactions on Image Processing, 9(8), 1450–1455.

    Article  Google Scholar 

  20. Lian, S. (2008). Multimedia content encryption: techniques and applications. New York: Auerbach Publication, Taylor & Francis Group.

    Google Scholar 

  21. Lewis, A., & Knowles, G. (1992). Image compression using the 2-D wavelet transform. IEEE Transactions on Image Processing, 1(2), 244–250.

    Article  Google Scholar 

  22. Petitcolas, F. (2002). Stirmark Benchmark. http://www.petitcolas.net/fabien/watermarking/stirmark/.

Download references

Acknowledgements

This work was jointly supported by NUIST Research Fund (Grant Numbers 20100390 and 20100391) and the Priority Academic Program Development of Jiangsu Higher Education Institutions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinwei Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, J., Lian, S., Yan, L. et al. Hybrid additive watermarking and its decoders. Telecommun Syst 54, 305–313 (2013). https://doi.org/10.1007/s11235-013-9735-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-013-9735-9

Keywords

Navigation