TY - GEN
T1 - Watermarking security incorporating natural scene statistics
AU - Ni, Jiangqun
AU - Zhang, Rongyue
AU - Fang, Chen
AU - Huang, Jiwu
AU - Wang, Chuntao
AU - Kim, Hyoung Joong
PY - 2008
Y1 - 2008
N2 - Watermarking security has emerged as the domain of extensive research in recent years. This paper presents both information theoretic analysis and practical attack algorithm for spread-spectrum based watermarking security incorporating natural scene statistics (NSS) model. Firstly, the Gaussian scale mixture (GSM) is introduced as the NSS model. The security is quantified by the mutual information between the observed watermarked signals and the secret carriers. The new security measures are then derived based on the GSM model, which allows for more accurate evaluation of watermarking security. Finally, the practical attack algorithm is developed in the framework of variational Bayesian ICA, which is shown to increase the performance and flexibility by allowing incorporation of prior knowledge of host signal. Extensive simulations are carried out to demonstrate the feasibility and effectiveness of the proposed algorithm.
AB - Watermarking security has emerged as the domain of extensive research in recent years. This paper presents both information theoretic analysis and practical attack algorithm for spread-spectrum based watermarking security incorporating natural scene statistics (NSS) model. Firstly, the Gaussian scale mixture (GSM) is introduced as the NSS model. The security is quantified by the mutual information between the observed watermarked signals and the secret carriers. The new security measures are then derived based on the GSM model, which allows for more accurate evaluation of watermarking security. Finally, the practical attack algorithm is developed in the framework of variational Bayesian ICA, which is shown to increase the performance and flexibility by allowing incorporation of prior knowledge of host signal. Extensive simulations are carried out to demonstrate the feasibility and effectiveness of the proposed algorithm.
UR - http://www.scopus.com/inward/record.url?scp=56749154333&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-88961-8_10
DO - 10.1007/978-3-540-88961-8_10
M3 - Conference contribution
AN - SCOPUS:56749154333
SN - 3540889604
SN - 9783540889601
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 132
EP - 146
BT - Information Hiding - 10th International Workshop, IH 2008, Revised Selected Papers
PB - Springer Verlag
T2 - 10th International Workshop on Information Hiding, IH 2008
Y2 - 19 May 2008 through 21 May 2008
ER -