Abstract
Multiwatermarking embeds multiple watermarks into the media content imperceptibly. It is regarded as the potential means to protect the media contents’ copyright and/or trace illegal redistributors in multi-user environments, e.g., collaborative media content production or layered media content distribution. However, there are still some open issues in designing a good multiwatermarking scheme, including the combination between multiple embedding steps, the combination between multiple watermarks and the security of embedding schemes. In this paper, novel multiwatermarking schemes are proposed, which are based on hybrid multi-bit multiplicative rules controlled by secret keys. Two hybrid multiplicative multiwatermarking decoders, i.e., optimum and locally optimum, are proposed, which are based on the minimum Bayesian risk criterion and the DWT coefficients are modeled as the generalized Gaussian distribution. The BER (average bit error rate) as the evaluation index of the performance of optimum hybrid decoders is exactly analyzed. Finally, experimental results are shown to confirm the validity of the theoretical and empirical analysis.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Akhaee, M., Sahraeian, S., Sankur, B., & Marvasti, F. (2009). Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Transactions on Multimedia, 11(5), 822–833.
Barni, M., Bartolini, F., Rosa, A., & Piva, A. (2000). Capacity of full frame DCT image watermarks. IEEE Transactions on Image Processing, 9(8), 1450–1455.
Barni, M., Bartolini, F., Rosa, A., & Piva, A. (2002). Optimum decoding and detection of a multiplicative amplitude encoded watermark. In Proceedings of SPIE 4675 on security and watermarking of multimedia contents IV, San Jose, CA, USA, Vol. 4657, pp. 409–420.
Chamlawi, R., Khan, A., & Usman, I. (2010). Authentication and recovery of images using multiple watermarks. Computers and Electrical Engineering, 36(1), 578–584.
Cheng, Q. (2009). Generalized embedding of multiplicative watermarks. IEEE Transactions on Circuits and Systems for Video Technology, 19(7), 978–988.
He, X., Zhu, T., & Yang, G. (2015). A geometrical attack resistant image watermarking algorithm based on histogram modification. Multidimension Systems and Signal Processing, 26, 291–306.
Lewis, A., & Knowles, G. (1992). Image compression using the 2-D wavelet transform. IEEE Transactions on Image Processing, 1(2), 244–250.
Lian, S., Liu, Z., Ren, Z., & Wang, H. (2007). Commutative encryption and watermarking in compressed video data. IEEE Transactions on Circuits and Systems for Video Technology, 17(6), 774–778.
Li, J., Li, X., Yang, B., & Sun, X. (2015). Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security, 10(3), 507–518.
Lu, C., & Hsu, C. (2007). Near-optimal watermark estimation and its countermeasure: Antidisclosure watermark for multiple watermark embedding. IEEE Transactions on Circuits and Systems for Video Technology, 17(4), 454–467.
Mairgiotis, A., Galatsanos, N., & Yang, Y. (2008). New additive watermark detectors based on a hierarchical spatially adaptive image model. IEEE Transactions on Information Forensics and Security, 3(1), 29–37.
Petitcolas, F. (2002). Stirmark benchmark. www.petitcolas.net/fabien/watermarking/stirmark/.
Sadreazami, H., Ahmad, M., & Swamy, M. (2014). A study of multiplicative watermark detection in the contourlet domain using alpha-stable distributions. IEEE Transactions on Image Processing, 23(10), 4348–4360.
Takahashi, A., Nishimura, R., & Suzuki, Y. (2005). Multiple watermarks for stereo audio signals using phase-modulation techniques. IEEE Transactions on Signal Processing, 53(2), 806–815.
Wang, J., & Lian, S. (2012a). On multiwatermarking in cloud environment. Concurrency and Computation: Practice and Experience, 24(17), 2151–2164.
Wang, J., & Lian, S. (2012b). On the hybrid multi-watermarking. Signal Processing, 92(4), 893–904.
Wang, J., Lian, S., & Yan, L. (2013). Hybrid multiplicative watermarking and its decoders. Telecommunication Systems, 54(3), 305–313.
Wang, J., Liu, G., Dai, Y., Sun, J., Wang, Z., & Lian, S. (2008). Locally optimum detection for Barni’s multiplicative watermarking in DWT domain. Signal Processing, 88(1), 117–130.
Xiao, J., & Wang, Y. (2009). Multiple watermarking with side information. In H. J. Kim, S. Katzenbeisser, & A. T. S. Ho (Eds.) International workshop on digital watermarking 2008 (pp. 379–387). Busan, Korea, Springer, LNCS 5450.
Zhang, F., & Zhang, X. (2007). Performance evaluation of multiple watermarks system. In 2nd workshop on digital media and its application in Museum & Heritage (pp. 15–18). Chongqing China.
Acknowledgments
This work was jointly supported by the National Natural Science Foundation of China (Grant Nos. 61272421, 61103141, 61232016, 61173141, 61103201,61402235), the Natural Science Foundation of Jiangsu Higher Education Institutions of China (Grant No. 12KJB520006), the Priority Academic Program Development of Jiangsu Higher Education Institutions, Jiangsu Government Scholarship for Overseas Studies and CICAEET.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, J., Lian, S. & Shi, YQ. Hybrid multiplicative multi-watermarking in DWT domain. Multidim Syst Sign Process 28, 617–636 (2017). https://doi.org/10.1007/s11045-015-0363-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11045-015-0363-2