Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 345892, 13 pages
http://dx.doi.org/10.1155/2014/345892
Research Article

An Enhanced Informed Watermarking Scheme Using the Posterior Hidden Markov Model

1College of Information, South China Agricultural University, Guangzhou 510642, China
2School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510275, China

Received 10 October 2013; Accepted 16 December 2013; Published 16 January 2014

Academic Editors: W.-J. Hwang, S. Salcedo-Sanz, and G. Wei

Copyright © 2014 Chuntao Wang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. Chen and G. W. Wornell, “An information-theoretic approach to the design of robust digital watermarking systems,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '99), vol. 4, pp. 2061–2064, Phoenix, Ariz, USA, March 1999.
  2. I. J. Cox, M. L. Miller, and A. L. Mckellips, “Watermarking as communications with side information,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1127–1141, 1999. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Chou, S. S. Pradhan, and K. Ramchandran, “On the duality between distributed source coding and data hiding,” in Proceedings of the 33rd Asilomar Conference on Signals, Systems, and Computers, vol. 2, pp. 1503–1507, Pacific Grove, Calif, USA, October 1999. View at Publisher · View at Google Scholar
  4. C. E. Shannon, “Channels with side information at the transmitter,” IBM Journal of Research and Development, vol. 2, no. 4, pp. 289–293, 1958. View at Publisher · View at Google Scholar
  5. M. H. M. Costa, “Writing on dirty paper,” IEEE Transactions on Information Theory, vol. 29, no. 3, pp. 439–441, 1983. View at Google Scholar · View at Scopus
  6. B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1423–1443, 2001. View at Publisher · View at Google Scholar · View at Scopus
  7. P. Moulin and J. A. O'Sullivan, “Information-theoretic analysis of information hiding,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '00), Sorrento, Italy, June 2000.
  8. P. Moulin, “The role of information theory in watermarking and its application to image watermarking,” Signal Processing, vol. 81, no. 6, pp. 1121–1139, 2001. View at Publisher · View at Google Scholar · View at Scopus
  9. A. S. Cohen and A. Lapidoth, “The Gaussian watermarking game,” IEEE Transactions on Information Theory, vol. 48, no. 6, pp. 1639–1667, 2002. View at Publisher · View at Google Scholar · View at Scopus
  10. W. Yu, A. Sutivong, D. Julian, T. M. Cover, and M. Chiang, “Writing on colored paper,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '01), p. 302, Washington, DC, USA, June 2001. View at Scopus
  11. P. Moulin and Y. Wang, “Capacity and random-coding exponents for channel coding with side information,” IEEE Transactions on Information Theory, vol. 53, no. 4, pp. 1326–1347, 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. J. J. Eggers, J. K. Su, and B. Girod, “A blind watermarking scheme based on structured codebooks,” in Proceedings of the IEE Seminar on Secure Images and Image Authentication, pp. 1–6, London, UK, April 2000.
  13. S. Voloshynovskiy, F. Deguillaume, S. Pereira, and T. Pun, “Optimal adaptive diversity watermarking with channel state estimation,” in 3rd Security and Watermarking of Multimedia Contents, vol. 4134 of Proceedings of SPIE, pp. 673–685, San Jose, Calif, USA, January 2001. View at Publisher · View at Google Scholar · View at Scopus
  14. J. J. Eggers, R. Bäuml, and B. Girod, “Estimation of amplitude modifications before SCS watermark detection,” in 4th Security and Watermarking of Multimedia Contents, vol. 4675 of Proceedings of SPIE, pp. 387–398, San Jose, Calif, USA, January 2002. View at Publisher · View at Google Scholar · View at Scopus
  15. F. Pérez-González, C. Mosquera, M. Barni, and A. Abrardo, “Rational dither modulation: a high-rate data-hiding method invariant to gain attacks,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3960–3975, 2005. View at Publisher · View at Google Scholar · View at Scopus
  16. F. Ourique, V. Licks, R. Jordan, and F. Pérez-González, “Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '05), pp. II797–II800, Philadelphia, Pa, USA, March 2005. View at Publisher · View at Google Scholar · View at Scopus
  17. C. Chen and X. Wu, “An angle QIM watermarking algorithm based on watson perceptual model,” in Proceedings of the 4th International Conference on Image and Graphics (ICIG '07), pp. 324–328, Sichuan, China, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. H. S. Malvar and D. A. F. Florêncio, “Improved spread spectrum: a new modulation technique for robust watermarkimg,” IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 898–905, 2003. View at Publisher · View at Google Scholar · View at Scopus
  19. M. L. Miller, G. J. Doërr, and I. J. Cox, “Applying informed coding and embedding to design a robust high-capacity watermark,” IEEE Transactions on Image Processing, vol. 13, no. 6, pp. 792–807, 2004. View at Publisher · View at Google Scholar · View at Scopus
  20. A. Abrardo and M. Barni, “Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 824–833, 2005. View at Publisher · View at Google Scholar · View at Scopus
  21. C. Wang, J. Ni, and J. Huang, “An informed watermarking scheme using hidden Markov model in the wavelet domain,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 853–867. View at Publisher · View at Google Scholar
  22. C. Wang, J. Ni, R. Zhang, G. R. Kwon, and S. J. Ko, “Content-adaptive robust image watermarking with posterior HMM-based detector,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 91, no. 8, pp. 1953–1960, 2008. View at Publisher · View at Google Scholar · View at Scopus
  23. M. S. Crouse, R. D. Nowak, and R. G. Baraniuk, “Wavelet-based statistical signal processing using hidden Markov models,” IEEE Transactions on Signal Processing, vol. 46, no. 4, pp. 886–902, 1998. View at Publisher · View at Google Scholar · View at Scopus
  24. J. Ni, R. Zhang, J. Huang, and C. Wang, “A robust multi-bit image watermarking algorithm based on HMM in wavelet domain,” in Proceedings of the 4th International Workshop on Digital Watermarking, vol. 3710 of Lecture Notes in Computer Science, pp. 110–123, 2005. View at Publisher · View at Google Scholar · View at Scopus