Skip to main content

Performance analysis and improvement of dither modulation under the composite attacks

Abstract

The first goal of this article is to analyze the performance of dither modulation (DM) against the composite attacks including valumetric scaling, additive noise and constant change. The analyzes are developed under the assumptions that the host vector and noise vector are mutually independent and both of them have independently and identically distributed components. We derive the general expressions of the probability density functions of several concerned signals and the decoding error probability. The specific theoretical results are provided for the case of generalized Gaussian host and noise. Based on the analyzes, the performance of DM is predicted for different scenarios with a high degree of accuracy and evaluated for different distribution models of host and noise signals. Numerical simulations confirm the validity of the given theoretical analyzes. Then, we address to improve the robustness of DM against valumetric scaling plus constant change. The normalized dither modulation (NDM) is presented, which works by constructing a gain-invariant vector with zero mean for quantization. Performance analysis shows that NDM is theoretically invariant to valumetric scaling and constant change and achieves similar performance to DM in other aspects. The performance of NDM is further improved by weighting the quantization errors. Experiments on real images also show the advantage of NDM over DM subject to amplitude scaling and constant change.

1 Introduction

In the past decade, much attention has been paid to the quantization-based watermarking for canceling the host signal interference. One of the most important methods proposed so far is quantization index modulation (QIM) [1]. The basic QIM algorithm includes a number of variants, i.e., dither modulation (DM), distortion compensated dither modulation (DC-DM) (also known as scalar Costa scheme (SCS) [2]) and spread transform dither modulation (STDM) [1]. The theoretical performance of QIM methods is a key issue and has received considerable attention.

Initially, the Gaussian channel is often used in the analyzes and the performance of QIM methods has been extensively investigated in this case. A relatively crude approximation to the decoding error probability of QIM was given in [1] for the additive white Gaussian noise (AWGN) attacks. The performance of SCS was completely analyzed by Eggers et al. [2] under the AWGN attacks. In [3], the performance of scalar DC-QIM against AWGN was theoretically evaluated from the detection viewpoint. Recently, a new logarithmic QIM (LQIM) was presented in [4] and its performance was analyzed in the presence of AWGN. It has been pointed out in [5] that the performance of QIM methods may be overstated under Gaussian channels. In the second phase, a deeper analysis is done for QIM taking into account a much wider variety of attacks. The careful performance analyzes were presented by Pérez-Gonzàlez et al. [5] for a large class of QIM methods in the cases of uniform and Gaussian noise. Bartolini et al. [6] concentrated on analyzing the performance of STDM in the presence of two important classes of non additive attacks, the gain attack plus noise addition and the quantization attack. In [7], the authors proposed an improved DM scheme to resist linear-time-invariant filtering and provided a thorough analysis of it. We notice that most of previous analyzes make use of the Gaussian host assumption and even neglect the statistical properties of the host signal.

The conventional QIM has a serious drawback, i.e., the weakness against valumetric scaling. Spherical codes were utilized to cope with this problem in [8]. However, watermark embedding and recovery get very complicated [9]. Oostveen et al. [10] proposed to choose the adaptive quantization step size to be proportional to a local average of the host signal samples. Despite its robustness against valumetric scaling, the method presents a nonzero probability of error even for null distortions and becomes more sensitive to constant change. Rational dithered modulation (RDM) was developed in [9] using a gain-invariant adaptive quantization step size at both embedder and decoder. The RDM achieves invariance to valumetric scaling, but is still sensitive to constant change. Li and Cox [11] applied the modified Watson's perceptual model to provide resistance to valumetric scaling for QIM watermarking. The modification to Watson's model results in the degradation in quality and performance loss with respect to constant change.

The first objective of this article is to analyze the performance of DM against composite attacks, which is lacking in the literature. Obviously, in watermarking applications, it is more often that the watermark undergoes multiple attacks. Specifically, the combination of valumetric scaling, additive noise and constant change will be considered. On the other hand, most of previous analyzes are restricted to the Gaussian noise channel, even sometime regardless of the distribution of the host signal, which we will try to overcome. The generalized Gaussian distribution (GGD) is adopted to model both the host signal and the noise signal in our analysis. Since the GGD is a parametric family of distributions, we will observe how the choice of distribution model affects the performance of DM. Next, the weakness of DM is concerned. DM itself is largely vulnerable to valumetric scaling as well as constant change. Several existing improved DM schemes achieve the robustness against valumetric scaling, but becomes more sensitive to constant change. We will present the normalized DM (NDM) considering both of them. Under the light of the performance analyzes done for DM in this article, we show that NDM approaches the performance of DM, with the great advantage of insensitivity to valumetric scaling and constant change.

The rest of this article is organized as follows. Section 2 reviews the original DM and describes the problems to be solved. Next, Section 3 accurately derives the general PDF models for several relevant signals. In Section 4, the performance of DM under the composite attacks is mathematically analyzed by the derived PDFs. The decoding error probability is given in closed form and the theoretical results are confirmed by numerical simulations. Then, in Section 5, the NDM method is presented and its performance is theoretically evaluated. Section 6 provides a useful strategy to improve the performance of NDM. In Section 7, a series of tests on real data are done to verify the validity of analytical derivations and evaluate the presented approaches. Finally, Section 8 concludes.

Notation: In the remainder of this article, we use boldface lower-case letters to denote column vectors, e.g., x, and scalar variables are denoted by italicized lower-case letters, e.g., x. The probability distribution function (PDF) of a random variable (r.v.) x is denoted by p X (x), whereas if x is discrete its probability mass function (PMF) is designated by P X (x). We write x ~ p X (x) to indicate that a r.v. x is distributed as p X (x). pX|Y(x|y) means the conditional probability of x given y. And the subscripts of the distribution functions will be dropped wherever it is clear the random variables they refer to. Finally, the mathematical expectation and standard deviation are respectively represented by μ x and σ x for a r.v. x.

2 Review of DM and problem

We will concentrate our attention on DM in this study. The uncoded binary DM can be summarized as follows.

Let x N be a host signal vector in which we wish to embed the watermark message m. First, the message m is represented by a vector b with NR m binary antipodal components, i.e., b j = ± 1, j = 1, ..., NR m , where R m denotes the bit rate. The host signal x is then decomposed into NR m subvectors (blocks) of length L = 1/R m , denoted by x 1 ,, x N R m . In the binary DM, two L-dimensional uniform quantizers Q-1(·) and Q+1(·) are constructed, whose centroids are given by the lattices and Λ-1 = 2ΔL + d and Λ+1 = 2ΔL + d+ Δa with d L a key-dependent dithering vector and a = (1, ..., 1)T. Each message bit b j is hidden by using Q b j ( ) on x j , resulting in the watermarked signal y N as

y j = Q b j ( x j ) , j = 1 , , N R m .
(1)

The watermark detector receives a distorted, watermarked signal, z, and decodes a message m ^ using the minimal distance decoder

b ^ j = arg  min - 1 , 1 Q b j ( z j ) - z j , j = 1 , , N R m ,
(2)

where ||·|| stands for Euclidean (i.e., 2) norm.

In practical watermarking applications, the watermarked signal might undergo composite attacks. It is well known that quantization-based watermarking is vulnerable to valumetric scaling attack. While the vector at the input of the decoder is scaled by ρ j , i.e., z j =ρ j y j , the quantization bins at the decoder are not scaled accordingly, thus producing a mismatch between embedder and decoder that dramatically affects performance. Also, the original DM is not robust to constant change distortion, i.e., z j = y j + c j a with c j a constant value. No decoding error is made for |c j | < Δ/2, however, the bit error rate (BER) is equal to 1 for Δ/2 <|c j | < 3Δ/2. In this study, the two attacks are considered together with additive noise v j , yielding the attacked signal as

z j = ρ j y j + ν j  +  c j a .
(3)

We will analyze the performance of DM in the case of (3), and present an improved DM resisting both valumetric scaling and constant change. In the subsequent analysis, x, y, z and ν are all regarded as random vectors. And we assume that both x and v have independently and identically distributed (i.i.d.) components and v is independent from y. Since the mean value of additive noise ν j can be counted by the third term in the right-hand side of (3), it is reasonable to assume that μ v = 0.

3 PDF models

Define the extracted vector r , r Q b ( z ) - z . Obviously, a crucial aspect when performing a rigorous analysis lies in computing the PDF of r. Let us begin with the issue.

3.1 PDF model of the watermarked signal

We use a lower-case letter to indicate any element of the vector denoted by the boldface one. The previously used index j is dropped for no specific values (or subvectors) are concerned. Given x ~ p X (x), from the relation (1), the PDF of the watermarked signal y conditioned on a transmitted symbol b is written as

p Y ( y | b ) = k = - δ ( y - y k ) y k - Δ y k + Δ p X ( x ) d x ,
(4)

where the variable y k is defined as y k = 2k Δ + (b + 1)Δ/ 2 + d and δ(·) denotes the delta function.

A few observations are in order about the PDF of y. First, for different dither value d, the PDF p Y (y|b) is different. That means each element of y obeys different distributions by randomly selecting d during embedding. However, due to the fact P Y (y k +2Δ|b) = P Y (y k +1|b) exists, it is sufficient for us to consider the case d [-Δ,Δ). Further, if the PDF p X (x) is symmetric, i.e., p X (x) = p X (-x), from (4), the PDF p Y (y) satisfies p Y (y|b = - 1) = p Y (-y|b = 1) for the case of d = - Δ/ 2 and p Y (y|b) = p Y (-y|b) for the case of d = 0. The former indicates that the PDFs p Y (y|b = - 1) and p Y (y|b = 1) are mirrors of each other and the latter indicates that the PDF p Y (y) is even. These two properties of p Y (y) are exhibited in Figure 1.

Figure 1
figure 1

The PDF curves of y for zero-mean Gaussian host data with variance 2552: (a) d = Δ 2 , (b) d = 0.

3.2 PDF model of the attacked signal

Taking the Equation (3) into account and using the fact that for any ρ>0 p ρ Y ( y ) = 1 ρ p Y y ρ holds, the conditional PDF of z given the transmitted symbol b can be obtained by convolution [12]

p Z ( z | b ) = k = - P Y ( y k | b ) p v ( z - ρ y k - c ) ,
(5)

where the convolution follows from the independence between y and ν. Observing (5), if the effect of different d on P Y (y) is ignored (this generally holds when the embedding distortion is acceptable), the PDF p Z (z|b) with d ≠ 0 can be approximately viewed as the translate of p Z (z|b) with d = 0, that is, p Z (z + ρd|b, d ≠ 0) ≈ p Z (z|b, d = 0).

Moreover, when both x and ν are distributed symmetrically around the origin, we have the mirror property p Z (z + 2c|b = - 1) = p Z (-z|b = 1) for the case d = - Δ/ 2, and the symmetric property p Z (z + 2c|b) = p Z (-z|b) for the case d = 0.

Figure 2a depicts qualitatively the PDFs of z for zero-mean Gaussian host data with variance 2552 and zero-mean Gaussian noise. It can be seen that there is a bell curve present around each discrete value of y due to the existence of Gaussian noise, and the two adjacent ones even overlap for a large noise strength. Meanwhile, the distance between two discrete points of y is scaled by the scaling factor ρ and p Z (z) is translated by constant value c. The corresponding empirical density curves of z are plotted in Figure 2b. We see that the analytical PDF of z fits well with empirical observations.

Figure 2
figure 2

The distribution curves of z in presence of the composite attacks for different values of the noise variance σ ν when given ρ = 0.95 and c = 13: (a) the theoretical results, (b) the empirical results.

3.3 PDF model of the extracted signal

Recalling the definition of r given previously, it is immediate to write

p R ( r | b ) = j = - p Z ( z j - r | b , d ) , r [ - Δ , Δ ) 0 , else ,

where p R (r|b) is the PDF of r conditioned on the transmitted symbol b, and z j has the similar definition with y k . Due to (5), the above equation becomes

p R ( r | b ) = j k P ( y k | b ) p v ( μ j k - r ) , r [ - Δ , Δ ) 0 , else
(6)

with μ jk = z j - ρy k - c.

Now, let us analyze the properties of p R (r). If ignoring the effect of d on P Y (y), in view of (6), we derive p R (r - ϵd|b, d ≠ 0) ≈ p R (r|b, d = 0) with ϵ = ρ - 1. This shows that for the case d ≠ 0 the PDF p R (r|b) can be approximately obtained by translating p R (r|b, d = 0). Further, while |ϵ| is small enough for neglecting the term ϵd, we have the property p R (r|b, d ≠ 0) ≈ p R (r|b, d = 0). That is, despite the choice of d, p R (r) approximately remains unchanged for small |ϵ|. Similarly to p Z (z), by assuming the PDFs p X (x) and p ν (ν) are even, we obtain the mirror property p R (r - 2c|b = 0) = p R (-r|b = 1) for d=- Δ 2 and the symmetric property p R (r - 2c|b) = p R (-r|b) for d = 0. At the same time, for any ϵ, we derive p R (r|b, ρ = 1 + ϵ) = p R (r|b, ρ = 1) for d = 0 and p R (r|b = 0, ρ = 1 + ε) = p R (r|b = 1, ρ = 1) for d=- Δ 2 , where p R (r|b, ρ) denotes the conditional PDF of r given the transmitted symbol b and the scaling factor ρ. These properties of p R (r) are helpful for us to analyze the performance of DM.

Figure 3 plots the probability density curves of r and the corresponding empirical ones for zero-mean Gaussian host data with variance 2552 and zero-mean Gaussian noise. As can be seen, the distribution curve of r is either dilated or compressed by the scale factor ρ, and the PDF p R (r) with c ≠ 0 corresponds to p R (r) with c = 0 translated by the constant value c. The probability that the values of r are distributed around zero decreases as attacks become strong, which results in the increase of BER. Comparison of Figure 3a, b reveals the analytical PDF of r fits perfectly with its empirical distribution.

Figure 3
figure 3

The distribution curves of r in presence of the composite attacks for different values of the noise variance σ ν and the scaling factor ρ when given c = 13: (a) the theoretical results, (b) the empirical results.

4 Performance analysis of DM against the composite attacks

As the previous literatures, the decoding bit error probability P e is used as the final performance measurement. Assuming that the symbol b is sent, the bit error probability will be

P e = P ( r > Δ a - r b )
(7)

where | r | denotes the vector of absolute values of components of r. Defining s | r | T a , the above expression is equivalent to

P e = L Δ / 2 L Δ p S ( s | b ) d s .
(8)

To compute P e , we need know the PDF p S (s) of s. The exact solution for p S (s) may be achieved by several means. One of the standard procedures is by performing multifold integral operation as

p S ( s | b ) = 0 ( L - 1 ) Δ 0 2 Δ 0 Δ p | R 1 | ( u 1 | b ) p | R 2 | ( u 2 - u 1 | b ) . . . p | R L | s - i = 1 L - 1 u i b d u 1 d u 2 d u L - 1 ,
(9)

where p |Rj| (r j |b) = p Rj (r j |b)+p Rj (-r j |b) and p Rj (r j ) is the PDF of the j th element of r. The computation of p S (s) is feasible for a small L by (9). However, it becomes impractical as L increases. To solve the problem, it is nature to use mathematically tractable approximations. Let us assume that all components of d are equal, so that the vector r has i.i.d components. At this point, by the well known central limit theorem (CLT), s thus can be approximated by a Gaussian random variable, whose mean and variance are |r|and L σ | r | 2 . Using the derived PDF in (6), μ|r|and σ | r | 2 are represented as

μ | r | = j k P ( y k | b ) - Δ Δ u p ν ( μ j k - u ) d u
(10)
σ | r | 2 = j k P ( y k | b ) - Δ Δ u 2 p ν ( μ j k - u ) d u - μ | r | 2 .
(11)

Then, the probability P e is computed as

P e Φ L ( Δ - μ | r | ) σ | r | - Φ L ( Δ / 2 - μ | r | ) σ | r | ,
(12)

where Φ(·) stands for the cumulative distribution function (CDF) of the standard Gaussian distribution. It should be pointed out the CLT approximation to P e is only valid for very large L. In reality, the condition is generally met in order to improve the watermarking robustness.

Now, we can observe several useful properties of P e from the previous analysis. When |ϵ| is small enough, by the property p R (r|b, d ≠ 0) ≈ p R (r|b, d = 0), it is easily understood that P e approximately remains unchanged for different dither value. Therefore, without loss of generality, d is set to 0. Furthermore, for d = 0, if both p X (x) and p ν (ν) are even, using the property p R (r|b, ρ = 1 + ϵ) = p R (r|b, ρ = 1 - ϵ), the same value of P e is obtained for the cases of ρ = 1- ϵ and ρ = 1 + ϵ. As a result, the property of P e also holds for d ≠ 0 approximately.

4.1 Generalized Gaussian host and noise

Theoretically, P e can be estimated only if the PDFs p X (x) and p ν (ν) are given. For the following analysis we consider a specific case where the host signal and attacking noise are statistically modeled by the GGD. The GGD model is used because it includes a family of distributions and suitable for many practical applications. The PDF of the GGD is defined as

p ( t ) = κ β 2 Γ ( β - 1 ) e - κ ( t - μ ) β ,
(13)

where κ= 1 σ Γ ( 3 β - 1 ) / Γ ( β - 1 ) , and Γ ( u ) = 0 t u - 1 e - t dt is the Gamma function. Thus, the distribution is completely specified by the mean μ, the standard deviation σ and the shape parameter β, and is denoted as GGD(β; μ, σ). The CDF of the GGD has the form [13]

Ψ ( t ) = 1 2 + s g n ( t - μ ) γ ( β - 1 , | κ ( t - μ ) | β ) 2 Γ ( β - 1 )

where γ ( u 1 , u 2 ) = 0 u 2 t u 1 - 1 e - t d t is the lower incomplete gamma function, and sgn(·) denotes the sign function, i.e.,

s g n ( t ) = 1 , t 0 - 1 , else .

Note that Gaussian and Laplacian distributions are just two special cases of the GGD with β = 2 and β = 1, respectively.

First, the PMF P Y (y) is calculated according to the distribution model of x. Given p X (x) ~ GGD(β x ; μ x , σ x ) and the corresponding CDF Ψ x (x), in view of (4), we immediately write

P Y ( y k | b ) = Ψ x ( y k + Δ ) - Ψ x ( y k - Δ ) .
(14)

Then, the integration terms in (10) and (11) are derived for the case p ν (ν) ~ GGD(β ν ; 0, σ ν ). In appendix, we obtain

- Δ Δ | u | p ν ( t - u ) d u = γ ( 2 β ν - 1 , | κ ( t - Δ ) | β ν ) - γ ( 2 β ν - 1 , | κ t | β ν ) 2 σ ν - 1 Γ ( β ν - 1 ) Γ ( 3 β ν - 1 ) + γ ( 2 β ν - 1 , | κ ( t + Δ ) | β ν ) - γ ( 2 β ν - 1 , | κ t | β ν ) 2 σ ν - 1 Γ ( β ν - 1 ) Γ ( 3 β ν - 1 ) + ( 2 Ψ ν ( t ) - Ψ v ( t - Δ ) - Ψ ν ( t + Δ ) ) t
(15)

and

- Δ Δ u 2 p ν ( t - u ) d u = γ ( 3 β ν - 1 , 0 ) - γ ( 3 β ν - 1 , | κ ν ( t - Δ ) | β ν ) 2 s g n ( t - Δ ) σ ν - 2 Γ ( 3 β ν - 1 ) + γ ( 3 β ν - 1 , | κ v ( t + Δ ) | β ν ) - γ ( 3 β ν - 1 , 0 ) 2 s g n ( t + Δ ) σ ν - 2 Γ ( 3 β ν - 1 ) - ( γ ( 2 β ν - 1 , | κ ( t + Δ ) | β ν ) - γ ( 2 β ν - 1 , | κ ( t - Δ ) | β ν ) ) t σ ν - 1 Γ ( β ν - 1 ) Γ ( 3 β ν - 1 ) + ( Ψ ν ( t + Δ ) - Ψ ν ( t - Δ ) ) t 2 (5)
(16)

Now, the decoding bit-error probability can be estimated by computing (10), (11), and (12) with the use of (14), (15), and (16). Since the calculation of p Y (y) is relatively simple in (4), the above analysis can be easily extended for other host distributions. However, the derivation of the integration terms in (10) and (11) might become very complex for the noise ν with other PDFs. Thus, they are computed numerically when needed.

4.2 Simulations on artificial signals

In order to verify the obtained theoretical results, we conduct a set of experiments on artificial signals. A set of 64000 random data, independently drawn from the GGD with zero mean and variance 2552, are used as the host signal. A random message with equiprobable information bit is embedded using DM with L = 64, Δ = 7.79, and d = 0. The noise signal is also generated according to the zero-mean GGD. We calculated the empirical BER under the composite attacks, and compared them to the theoretical values. The obtained results are summarized in Figure 4 for the case of Gaussian host and noise.

Figure 4
figure 4

The performance of DM in the presence of the composite attacks, z = ρy + ν + c a: (a) BER versus ρ, while fixing c and σ ν , (b) BER versus c, while fixing ρ and σ ν , (c) BER versus σ ν , while fixing ρ and c. Lines and symbols stand for theoretical values and empirical data, respectively.

Figure 4a shows the BER of DM as a function of the scaling factor ρ while fixing the constant value c and the noise standard deviation σ ν . As can be seen, DM is definitely very sensitive to the scaling attack. The probability of error is unacceptably high when ρ movies beyond the range [0.98, 1.02]. The existence of noise and constant change causes the increase of BER further. And the effect of constant change becomes relatively distinct for strong noise. The theoretical approximation of BER agrees almost perfectly with the empirical results, particularly in the case of weak attacks. Figure 4a also demonstrates that the BER versus ρ curve is symmetric with respect to the point ρ = 1. Figure 4b depicts the plots of BER versus the constant value c while fixing the scaling factor ρ and the noise standard deviation σ ν . For small ρ and σ ν , the BER of DM starts to grow rapidly as long as the absolute value of c approaches to Δ/2. The effect of c on performance decreases as ρ and σ ν increase. The estimated BERs are approximately equal to the empirical ones, but the estimation accuracy gets worse for a large c. At the same time, Figure 4b shows that the BER versus c curve is symmetrical around c = 0. Figure 4c plots the BER of DM as a function of the noise standard deviation σ ν while fixing the scaling factor ρ and the constant value c. Obviously, the BER increases as σ ν becomes large. The curve of BER versus σ ν seems to be translated due to the effect of valumetric scaling and constant change distortions. Similar to the previous tests, the theoretical BERs fit the empirical ones very well and the maximal difference between them is lower than 0.02.

In the sequel, the sensitivity of DM to statistical properties of the host and noise is investigated. We tested the performance of DM against valumetric scaling attacks for different host PDF shapes controlled by β x . The results are displayed in Figure 5a. It is remarkable that the performance of DM increases significantly as β x goes down. For a small β x , the BER plot becomes relatively flat and the BER grows slowly. This behavior can be explained as follows. For the GGD, the smaller β x is, the more impulsive the shape, and the heavier the tails. As a result, the probability that a big value of x presents over the range of interests decreases. Thus, the introduced distortion (ρ - 1)y by the scaling attack degrades for the same value of ρ, resulting in the decrease of BER. We also observe that the theoretical approximation agrees almost perfectly with the empirical results for the cases β x = 2, 8, but does worse for β x = 1. This is because the CLT approximation to BER may underestimate the importance of the tails of p X (x) with β x = 1 and gives the smaller results than the true BERs [5]. However, in terms of constant change and additive noise, the performance of DM is insensitive to the shape parameter β x , due to the fact that the two operations are independent from the watermarked signal. Hence, we just provide the results for the scaling attack herein. Then, we tested the performance of DM against additive noise with different PDF shapes controlled by β ν . The results are exihibited in Figure 5b. We observe that the BER of DM goes down as β ν increases for the same noise variance. Applying the same reasoning above here, we may understand that relatively serious distortions are introduced by the noise attack with a large β ν , and thus, the performance of DM worsens.

Figure 5
figure 5

The sensitivity of DM to the shapes of the host and noise distributions: the performance of DM (a) against valumetric scaling for the GGD host signals and (b) against additive GGD noise. Lines and symbols stand for theoretical values and empirical data, respectively.

5 Normalized DM and its performance

The robustness improvement for DM is taken into account in this section. A novel normalized DM (NDM), is presented, which is theoretically invariant to valumetric scaling and constant change. On the other hand, the performance of NDM is theoretically evaluated in terms of null distortions and noise addition.

5.1 Normalized DM

The main idea of NDM is to construct a gain-invariant vector with zero mean for quantization. There are many strategies for the construction of such a vector. In the study, the vector is achieved in the way that the host vector subtracts its nonzero sample mean and then is divided by its sample standard deviation. The method is described in details as follows.

Let ū u T a/L and S u 2 || u -ū| | 2 /L denote the sample mean and variance of a L-dimensional vector u, respectively. Watermark embedding is performed by

y j = λ j S x j Q b j x j - x ̄ j a S x j + η j a
(17)

for j = 1, ..., NR m , where the factors λ j and η j are determined by two specific distortion situations. For convenience, we define the normalized host vector as x j = ( x j - x ̄ j a ) / S x j and the error vector as q e j = Q b j ( x j ) - x j . By (17), the sample variance of y j satisfies S y j 2 = λ j 2 S x j 2 ( 1 + S q e j 2 + 2 q e j T x j / L ) . An appropriate strategy to choose λ j is to let S y j 2 = S x j 2 . Therefore, we have

λ j = ( 1 + S q e j 2 + 2 q e j T x j / L ) - 1 2 .
(18)

Then, η j is obtained through minimizing the distance ||y j - x j ||. This leads to

η j = x ̄ j - λ j S x j q ̄ e j .
(19)

At detection time, the received signal z is first normalized as done at the embedder's side and then the minimal distance decoder is applied. The modified detector is represented as

b ^ j = arg  min - 1 , 1 z j - z ̄ j a S z j - Q b j z j - z ̄ j a S z j .
(20)

Now, it is possible to simultaneously see why NDM is insensitive to valumetric scaling and constant change attacks: Substituting z j = p j y j +c j a into (20), it can be readily verified that ρ j and c j cancel out in the expression, and consequently, the decision b ^ j does not depend on ρ j and c j .

5.2 Performance analysis

Having known that NDM overcomes the main weakness of the conventional DM, we will evaluate the performance of NDM in terms of null distortions and noise addition. Performing the normalization operation on both sides of (17) and applying (18) and (19), we get

y j - ȳ j a S y j = λ j Q b j x j - x ̄ j a S x j - q ̄ e j a .
(21)

The above equation indicates that NDM introduces two extra operations in the absence of channel noise: valumetric scaling with λ j and constant change with q ̄ e j . In other words, NDM can be regarded as DM undergoing valumetric scaling and constant change distortions. Thus, the theoretical performance of NDM for null distortions is approximately determined by (10), (11), and (12) as the noise standard deviation σ ν approaches zeros.

To evaluate the effect of λ j and q ̄ e j in (21) on the performance of NDM, we introduce the document-to-watermark ratio (DWR), defined as ζ j L S x j 2 / y j - x j 2 for the j th subvector. Combining (17), (18) and (19), λ j can be rewritten as

λ j = ( 1 - 1 2 ζ j ) / ( 1 + q e j T x j L ) .
(22)

For small Δ, it has been shown [14] that each element of the error vector q e obeys independently a uniform distribution over the interval [-Δ, Δ) and q e is statistically independent from x j . Applying the properties, it is easy to derive that q e j T x j / L in (22) has zero mean and variance Δ2/(3L). Thus, λ j tends to 1 - 0.5/ζ j as L → ∞ or Δ → 0 (i.e., ζ j → ∞). Figure 6 plots the curves of the true average error |λ j - 1| versus ζ j for different L, as well as the limit 0.5/ζ j . Notably, the gap between the factor λ j and its limit becomes smaller and smaller as L and DWR increase. Over the most interesting range of ζ j from 25 dB to 50 dB, the value of |λ j - 1| is less than 0.01 for all the values of L tested. From Figure 4a, it is observed that the valumetric scaling with |λ j - 1| < 0.01 affects the performance of NDM so less that no decoding error is made.

Figure 6
figure 6

The average empirical values of | λ j - 1| and the corresponding limit as a function of DWR.

As to the constant change with E{ q e j } , we have a sufficient condition that E { q e j } < Δ / 2 for making no error. Considering the statistical properties of q e j , it is possible to resort to the CLT to show that for large L, the sample mean q ̄ e j can be accurately modeled by a Gaussian PDF with zero mean and variance Δ2/(3L). Thus, the probability that | q ̄ e j |<Δ2 holds can be computed as

P ( | q ̄ e j | < Δ / 2 ) 1 - 2 Φ ( - 3 L / 4 ) .
(23)

Since the probability in (23) approaches the value of 1 as L increases, NDM can present a zero probability of error as the original DM for large L in the absence of channel noise. Figure 7 shows the plots of the BER as a function of L. As shown in Figure 7, the probability of error sharply decreases to 0 as L increases. And the agreement of theoretical results with simulations is excellent.

Figure 7
figure 7

BER versus the number of host samples to conceal one bit information.

Next, we will analyze the performance of NDM in noise channel. The received signal z j has the form z j = y j + ν j , where ν j is an unknown noise source with zero sample mean and ν j and y j are orthonormal. Since NDM is invariant to valumetric scaling and constant change attacks, it's sufficient to consider the case. To measure the impact of the noise, we will follow the popular watermark-to-noise ratio (WNR), defined as ξ j | | y j - x j | | 2 / | | ν j | | 2 for the j th subvector. Applying the normalization operation to z j yields

z j - z ̄ j a S z j = λ j Q b j x j - x ̄ j a S x j + ν j  +  q ̄ e j a
(24)

with λ j = λ j ζ j ξ j ζ j ξ j + 1 , ν j = ζ j ξ j ζ j ξ j + 1 ν j s x j , and q ̄ e j =- λ j q ̄ e j . Expression (24) illustrates that NDM undergoes the composite attacks as considered in (3). Therefore, the previously obtained theoretical results can be used to predict the performance of NDM.

Generally speaking, the factor λ j in (24) is approximately equal to the value of 1 by the fact that ζ j ξ j 1 holds in practical applications. Figure 8 shows that the value of | λ j -1| is rather less even for serious distortions (e.g., WNR = -10 dB). On the other hand, for large L, the effect of q ̄ e j in (24) can be neglected. Based on these two considerations, the increase of BER is mainly derived from the term ν j in (24). As a result, we can draw the conclusion that NDM almost resists the same amount of noise as the original DM. Figure 9 illustrates the performance difference between NDM and DM under the additive noise attacks. As can be seen, NDM performs slightly worst than DM when the WNR is within the range [-1 dB, 3 dB], but outperforms it once WNR is lower than -1 dB. In principal, their performance is very close in this regard. Under the light of the above analysis we conclude that NDM achieves the performance approximately equal to DM, still keeping invariance against valumetric scaling and constant change attacks.

Figure 8
figure 8

The average empirical values of | λ j -1| as a function of WNR for different values of DWR.

Figure 9
figure 9

BER as a function of AWGN for Gaussian host.

6 The improvement of NDM

The previous analysis shows that when λ j ≠ 1 and q ̄ e j 0 the two factors have the negative impact on the performance of NDM. Thus, the influence of them should be decreased or eliminated so as to obtain the improved performance. Based on this idea, we present the improved NDM (IM-NDM) in the sequel.

In IM-NDM, the watermarked vector is generated by weighting the quantization error signal and adding it back to the host signal. The modified embedder is expressed as

y j = λ j S x j ( x j + α j q e j ) + η j a ,
(25)

where α j denotes the weight vector whose element is between 0 and 1, and α j q e j indicates that each dimension of α j is multiplied by the corresponding dimension of q e j · Similarly to (18) and (19), it is derived that

λ j = ( 1 + S q e j 2 + 2 q e j T x j / L ) - 1 2
(26)

and

η j = x ̄ j - λ j S x j q ̄ e j .
(27)

Note that NDM is a special case of IM-NDM with α j = a. The weight vector α j plays an important role in the performance of IM-NDM. Through a careful choice of α j , the influence of both λ j and q ̄ e j in (25) can be decreased (or even eliminated), and at the same time the distortion-compensation (DC) mechanism is introduced. The latter is proved to be an effective way to improve the performance of quantization-based watermarking [1].

By letting λ j = 1 and η j = x ̄ j , we have

( α j q e j ) T ( α j q e j + 2 x j ) = 0 ( α j q e j ) T a = 0 .
(28)

Taking use of one solution of (28) in (25) allows us to eliminate the negative impact of λ j and η j . Obviously, it is easy to obtain one solution of (28) for one of the two equations in (28) is linear. If (28) has multiple solutions, an appreciate one should be chosen by the performance of IM-NDM. Obtaining the appropriate solution for α j and investigation of its effect on watermarking performance is beyond the scope of this article and is a good direction for future research. If (28) has none solution, α j should be chosen to minimize |λ j - 1| under the situation η j = x ̄ j . This is a constraint optimization problem and can be solved using the Lagrangian multiplier method.

Figure 9 illustrates the performance of IM-NDM described above under the additive noise attack, together with DC-DM, and the distortion compensated NDM (DC-NDM), namely IM-NDM taking the same weight for each element of q e j , where the DC value is set to 0.66 for the latter two schemes. Obviously, DC-NDM almost presents the same robustness as DC-DM against weak attacks, and performs a little better facing very serious distortions (WNR <-4 dB). And they are noticeably outperformed by IM-NDM.

7 Experimental results

In this section, a series of experiments are conducted on real images to evaluate the validity of analytical derivations and performance of the proposed method.

7.1 Theoretical verification

In the experiments, we use three standard images, shown in Figure 10. The DM method is implemented in the spatial domain so as to observe its performance without the impact of transform operations. Specifically, all pixels of one image are rearranged in a vector as the host signal. A random binary message is embedded into the host vector by DM when given the quantization step Δ, the dither value d and the number of dimensions L. The watermarking algorithm is tested under the composite attacks of valumetric scaling with the factor ρ, constant change with the value c and additive noise ν following the distribution GGD(β ν ; 0, σ ν ). The distribution parameters of image pixels used for the computation of theoretical BERs are displayed in Table 1, which are obtained by the maximum likelihood estimator [15]. The experimental results are summarized in Figure 11 for L = 32, Δ = 8, and d = 0.

Figure 10
figure 10

Three standard test images: Crowd (right), Mandrill (middle), and Lena (left).

Table 1 Mean, variance, and shape parameter of image pixels
Figure 11
figure 11

The performance of DM in the presence of the composite attack z = ρy + ν + c a: (a) BER versus ρ, while c= Δ 8 , σ ν = Δ 4 , and β ν = 2, (b) BER versus c, while ρ = 1.01, σ ν = Δ 4 , and β ν = 2, (c) BER versus σ ν , while ρ = 1.01, c= Δ 8 , and β ν = 1, (d) BER versus σ ν , while ρ = 1.01, c= Δ 8 and β ν = 8.

Figure 11a depicts the plots of BER as a function of the scaling factor ρ for each image. On the Crowd image, which has the smallest shape parameter among the tested images, DM achieves the best performance. This behavior is consistent with the results in Figure 5a. The shape parameter of the Lena image is larger than one of Mandrill, but better performance is achieved on the Lena image. This can be explained as follows. The valumetric scaling operation introduces the serious distortions on the Mandrill image with a distinctively large mean luminance. As a result, not only the performance gain caused by the host PDF shape cancels out but also the BER grows up. The analytical curves closely fit the empirical data for the Lena and Mandrill images. By contrast, the prediction accuracy becomes slightly worse for the Crowd image. That is mainly due to the fact that the GGD is a poor model for this image. Figure 11b illustrates the sensitivity of DM to the addition/subtraction of a constant luminance value while fixing ρ and σ ν . In the test, DM performs closely for all the test images. That is, the performance of DM with respect to constant change attack is insensitive to the statistical properties of host signal. It is remarkable that the empirical performance of DM is predicted by the theoretical results with a high degree of accuracy. The plots of BER versus the standard deviation σ ν are shown in Figure 11c for β ν = 1 and Figure 11d for β ν = 8 while fixing ρ and c. As to the attack, the obvious performance difference is observed between different images. The effect is actually caused by the valumetric scaling operation, and thus can be removed by setting ρ = 1. Comparing Figure 11c with Figure 11d, it becomes clear that the additive noise with a flat PDF is a worst-case attack for DM. This agrees with the observation in Figure 5b. In the two cases, the predictions are desirable, but there are small discrepancies at some points.

7.2 Performance evaluation

We tested the performance of the proposed NDM in terms of imperceptibility and robustness and compared it with DM, DC-DM, Oostveen's method [10] and RDM [9]. Experiments were carried out on a database of 4000 images from the Corel database, each of dimension 256 × 384. The watermark embedding was performed in the spatial domain in order to see the sensitivity of the tested schemes to constant intensity change. Specifically, we divided the target image into nonoverlapping blocks of size 8× 8 and extracted a total of 225 blocks with the highest local variance. Each of the extracted blocks was modulated with two random message bits, so a total of 450 bits can be embedded into one image. The DC value was set to 0.66 for DC-DM. The L2 vector norm of 50th-order was used as the division function in RDM.

In the experiment on watermarking imperceptibility, the watermark energy induced by all the tested schemes is kept the same and in this case the watermarked images' quality is assessed with several objective image quality metrics. The weighted peak signal-to-noise ratio (wPSNR) and the total perceptual error (TPE) are used to measure the global image quality, as well as the number of blocks greater than the first local perceptual error threshold (NLPE1) and the second local perceptual error threshold (NLPE2) to measure the local image quality. The parameters for them take the default values as suggested in Checkmark [16]. Table 2 reports the experimental results averaged over all the test images when the DWR is fixed at 21 dB.

Table 2 Watermark imperceptibility assessment in use of several image quality metrics

As shown in Table 2, among all the tested watermarking schemes, NDM and its improved version offer the highest wPSNR values (in dB), the smallest TPE, NLPE1, and NLPE2 values for the same watermark energy. They all indicate that the performance of NDM, in terms of imperceptibility, is better than that of other ones. This is because the adaptive quantization step size is chosen to be proportional to the local variance of the host image in NDM (see (17)). The image quality produced by IM-NDM degrades when compared with NDM. The situation also presents between DM and DC-DM. This is attributed to the fact that a large quantization step is used for watermark embedding with distortion compensation. Surprisingly, RDM manifests the worst performance in this regard.

In what follows, the watermark robustness will be evaluated with respect to some typical image processing operations. The watermarked images were produced by the tested schemes when fixing DWR at 21 dB. All the given BERs are averaged over the test set of images, except otherwise indicated.

Figure 12 shows the robustness to amplitude scaling for all schemes. Clearly, except the conventional DM and DC-DM, the others manifest strong robustness against this attack. Particularly, the lowest values of BER are achieved by IM-NDM over the whole range of scaling factor ρ tested. However, when ρ exceeds 1.2, the robustness of IM-NDM goes down slightly. That can be attributed to the increasing rounding and clipping distortions.

Figure 12
figure 12

BER as a function of amplitude scaling.

Figure 13 illustrates the sensitivity of all schemes to the addition/subtraction of a constant luminance value c. It can be seen that both DM and DC-DM are very fragile to constant change attack. The BER of them sharply increases to 1 when c gets close to 10 or -10. Although Oostveen's method and RDM perform better than the original QIM schemes, they are still sensitive to this kind of attack. Our methods are evidently more robust in this regard than other ones. They are almost invariant to constant change and approximately keep the BER of 0 over the range of c tested.

Figure 13
figure 13

BER as a function of constant luminance change.

The robustness to AWGN is shown in Figure 14 for each watermarking scheme. In this regard, NDM clearly outperforms Oosteen' method and RDM. Comparing with DM, NDM achieves higher BER for weak noise. This can be explained by the fact that the introduced noise causes the errors in the estimation of the quantization step size for NDM. However, as the noise becomes strong, the BER of DM grows rapidly and is finally lower than one of NDM. The situation is in accordance with the analytical results in Section 5.2. Note that IM-NDM behaves like NDM but presents the improved performance.

Figure 14
figure 14

BER as a function of AWGN.

The robustness of NDM against AWGN was also tested on the Lena image to verify the analytical derivations for NDM. Since the performance of NDM depends on the local variance of the host image, the empirical BER can not be accurately predicted by exploiting the information from a certain image block. Thus, for the computation of the theoretical BER, we chose three image blocks with different variance: the middle one is around the average variance over those image blocks for watermark embedding and other two ones are respectively a little larger and smaller than it. The theoretical and empirical results are depicted in Figure 15. As can be seen, the upper analytical curve relatively fits well to empirical observations in the weak noise case, and other two curves respectively do well for the moderate noise and strong noise cases respectively. In principle, the theoretical results are effective for real image.

Figure 15
figure 15

The theoretical and empirical BER of NDM in the presence of AWGN attack. The theoretical BER is obtained on three image blocks with different variances: the middle variance (M-T), the smaller variance (S-T) and the larger variance (L-T).

The sensitivity to JPEG compression is investigated in Figure 16. In this test, NDM performs a little worse than DM. IM-NDM improves the robustness of NDM, but still falls behind DC-DM. It is worth seeing that RDM has superior performance with respect to JPEG compression. That can be explained by the nature of JPEG compression. Unlike the AWGN, JPEG compression is an image-dependent processing operation. The goal of it is to reduce an image file size without noticeable image quality degradation. Thus, the perceptually unrelevant data are removed from an image after compression. The test results of image quality reveals that RDM modifies the image data to be easily noticed more largely than other ones, so that it is impaired less by compression. The situation is opposite for NDM. If the perceptual quality is set to be same for all the tested schemes, it is reasonable to believe that NDM will manifest better performance.

Figure 16
figure 16

BER as a function of JPEG quality.

NDM is just a basic watermarking algorithm like DM. The above tests allow us to evaluate its performance baseline and the implementation is coarse. If one wants to design a NDM based watermarking scheme for practical applications, some effective technologies on performance improvement should be carried out, such as the choice of transform domain, the use of error-correction coding, etc. Several image-adaptive DM algorithms are presented by exploiting the characteristics of the human visual system in [11]. The same ideas can be straightforwardly applied to improve the performance of NDM. Recently, a new Logarithmic QIM is developed by introducing the μ-Law concept in [4]. NDM can also attempt to use the concept for the improvement of performance.

8 Conclusion

The contribution of this article is twofold. First, we have been theoretically evaluated the performance of DM facing the combination of valumetric scaling, additive noise and constant change. The analyzes were developed under the assumptions that both the host vector and the noise vector have i.i.d components and the two vectors are independent. We accurately derived the general expressions of the PDFs of the watermarked signal, the attacked signal and the extracted signal. By these derived PDFs, the decoding error probability was generally expressed in closed form. The specific analytical results were presented for the case of generalized Gaussian host and noise. Moreover, the theoretical results can be easily extended by modeling the host and noise signals with other distributions.

According to our analyzes, DM is largely vulnerable to valumetric scaling. And constant change and additive noise give rise to the relatively large performance loss of DM by combining them with valumetric scaling. Particularly, we have seen the effect of statistical properties of the host and noise signals on the performance of DM. The more impulsive the PDF shape of the host signal, the more robust DM is to valumetric scaling. The more flat the PDF shape of the noise source, the more sensitive DM is to additive noise. Simulations on artificial signals and real images show us that the bit-error probability is accurately predicted by the given theories for a wide range of host and noise PDF shapes. These can ultimately guide the design of efficient watermarking algorithms based on DM.

Second, a novel watermarking method, called NDM, has been developed. In the method, the normalized host signal vector is constructed for quantization. The NDM achieves its theoretical invariance to both valumetric scaling and constant change, but leads to small performance loss in the absence of channel noise. The BER of NDM against additive noise can be predicted by applying the presented theoretical results of DM. Further, the NDM is improved by weighting the quantization errors. Experiments on images demonstrate that the proposed method achieves better watermark imperceptibility and extremely strong robustness against valumetric scaling and constant change attacks comparing with the original QIM schemes and other improved versions.

Appendix

Here, we will derive the integration terms in (10) and (11) when the attacking noise obeys the distribution GGD(β ν ; 0, σ ν ). For this purpose, using a variable t instead of μ jk , they are, respectively, rewritten as

- Δ Δ | u | p ν ( t - u ) d u = 0 Δ u ( p ν ( t + u ) + p ν ( u - t ) ) d u = - t Δ - t u p ν ( u ) d u + t t + Δ u p ν ( u ) d u + t - t Δ - t p ν ( u ) d u - t t + Δ p ν ( u ) d u )
(29)

and

- Δ Δ u 2 p ν ( t - u ) d u = t - Δ t + Δ ( u 2 - 2 t u + t 2 ) p ν ( u ) d u = t - Δ t + Δ u 2 p ν ( u ) d u - 2 t t - Δ t + Δ u p ν ( u ) d u + t 2 t - Δ t + Δ p ν ( u ) d u
(30)

Thus, achieving the two integrations can be attributed to the computation of I(t1, t2), defined as I ( t 1 , t 2 ) t 1 t 2 u l p ν ( u ) du with l being an integer.

Considering the case of t1 ≥ 0 and t2 ≥ 0, we have

I ( t 1 , t 2 ) = κ ν β ν 2 Γ ( β ν - 1 ) t 1 t 2 u l e - | κ ν u | β ν d u = 1 2 Γ ( β ν - 1 ) κ ν l ( κ ν t 1 ) β ν ( κ ν t 2 ) β ν u l + 1 β ν - 1 e - u d u = γ ( ( l + 1 ) β ν - 1 , ( κ ν t 2 ) β ν ) - γ ( ( l + 1 ) β ν - 1 , ( κ ν t 1 ) β ν ) 2 σ ν - l ( Γ ( β ν - 1 ) ) 2 - l ( Γ ( 3 β ν - 1 ) ) l
(31)

where the first equality follows from (13) and the final equality follows from the definition of the lower incomplete gamma function.

In the case of t1 ≤ 0 and t2 ≤ 0, I(t1, t2) has the form

I ( t 1 , t 2 ) = κ ν β ν 2 Γ ( β ν - 1 ) t 1 t 2 u l e - ( - κ ν u ) β ν d u = ( - 1 ) l + 1 κ ν β ν 2 Γ ( β ν - 1 ) - t 1 - t 2 u l e - ( - κ ν u ) β ν d u = γ ( ( l + 1 ) β ν - 1 , ( - κ ν t 2 ) β ν ) - γ ( ( l + 1 ) β ν - 1 , ( - κ ν t 1 ) β ν ) 2 ( - 1 ) l + 1 σ ν - l ( Γ ( β ν - 1 ) ) 2 - l ( Γ ( 3 β ν - 1 ) ) l
(32)

where the final equality follows from (31).

Last, while t1 ≤ 0 and t2 ≥ 0, it follows that

I ( t 1 , t 2 ) = κ ν β ν 2 Γ ( β ν - 1 ) t 1 0 u l e - ( - κ ν u ) β ν d u + 0 t 2 u l e - ( - κ ν u ) β ν d u = γ ( ( l + 1 ) β ν - 1 , 0 ) - γ ( ( l + 1 ) β ν - 1 , ( - κ ν t 1 ) β ν ) 2 ( - 1 ) l + 1 σ ν - l ( Γ ( β ν - 1 ) ) 2 - l ( Γ ( 3 β ν - 1 ) ) l + γ ( ( l + 1 ) β ν - 1 , ( κ ν t 2 ) β U ) - γ ( ( l + 1 ) β ν - 1 , 0 ) 2 σ ν - l ( Γ ( β ν - 1 ) ) 2 - l ( Γ ( 3 β ν - 1 ) ) l
(33)

where the final equality is due to (31) and (32). Combining the three cases, a unified form of I(t1, t2) is

I ( t 1 , t 2 ) = γ ( ( l + 1 ) β ν - 1 , 0 ) - γ ( ( l + 1 ) β ν - 1 , | κ ν t 1 | β ν ) 2 ( s g n ( t 1 ) ) l + 1 σ ν - l ( Γ ( β ν - 1 ) ) 2 - l ( Γ ( 3 β ν - 1 ) ) l + γ ( ( l + 1 ) β ν - 1 , | κ ν t 2 | β ν ) - γ ( ( l + 1 ) β ν - 1 , 0 ) 2 ( s g n ( t 2 ) ) l + 1 σ ν - l ( Γ ( β ν - 1 ) ) 2 - l ( Γ ( 3 β ν - 1 ) ) l
(34)

By the formula (34) and the CDF of the GGD, (29) becomes

- Δ Δ | u | p ν ( t - u ) d u = γ ( 2 β ν - 1 , | κ ( t - Δ ) | β ν ) - γ ( 2 β ν - 1 , | κ t | β ν ) 2 σ ν - 1 Γ ( β ν - 1 ) Γ ( 3 β ν - 1 ) + γ ( 2 β ν - 1 , | κ ( t + ) | β ν ) - γ ( 2 β ν - 1 , | κ t | β ν ) 2 σ ν - 1 Γ ( β ν - 1 ) Γ ( 3 β ν - 1 ) + ( 2 Ψ ν ( t ) - Ψ ν ( t - Δ ) - Ψ ν ( t + Δ ) ) t

and (30) becomes

- Δ Δ u 2 p ν ( t - u ) d u = γ ( 3 β ν - 1 , 0 ) - γ ( 3 β ν - 1 , | κ ν ( t - ) | β ν ) 2 s g n ( t - Δ ) σ ν - 2 Γ ( 3 β ν - 1 ) + γ ( 3 β ν - 1 , | κ ν ( t + ) | β ν ) - γ ( 3 β ν - 1 , 0 ) 2 s g n ( t + Δ ) σ ν - 2 Γ ( 3 β ν - 1 ) - ( γ ( 2 β ν - 1 , | κ ( t + Δ ) | β ν ) - γ ( 2 β ν - 1 , | κ ( t - Δ ) | β ν ) ) t σ ν - 1 Γ ( β ν - 1 ) Γ ( 3 β ν - 1 ) + ( Ψ ν ( t + Δ ) - Ψ ν ( t - Δ ) ) t 2

Acknowledgements

This study was supported by the National Natural Science Foundation of China (Grant No. 60803122, 61103018), by the Natural Science Foundation of Jiangsu Province (Grant No. BK2011442), by the Innovative Foundation of Yangzhou University (Grant No. 2011CXJ023), by the Opening Project of State Key Laboratory of Digital Publishing Technology, and by the Opening Project of State Key Laboratory of Software Development Environment (Grant No. SKLSDE-2011KF-08). The authors would like to thank the anonymous reviewers for their detailed comments that improved both the editorial and technical quality of this article substantially.

Abbreviations

AWGN:

additive white Gaussian noise

CDF:

cumulative distribution function

CLT:

central limit theorem

DC:

distortion-compensation

DC-DM:

distortion compensated dither modulation

DC-NDM:

distortion compensated NDM

DM:

dither modulation

DWR:

document-to-watermark ratio

GGD:

generalized Gaussian distribution

i.i.d.:

independently and identically distributed

IM-NDM:

improved NDM

LQIM:

logarithmic QIM

NDM:

normalized dither modulation

NLPE1:

number of blocks greater than the first local perceptual error threshold

NLPE2:

number of blocks greater than the second local perceptual error thresh-old

PDF:

probability distribution function

PMF:

probability mass function

BER:

bit error rate

QIM:

quantization index modulation

r.v.:

random variable

RDM:

rational dithered modulation

SCS:

scalar Costa scheme

STDM:

spread transform dither modulation

TPE:

total perceptual error

WNR:

watermark-to-noise ratio

wPSNR:

weighted peak signal-to-noise ratio.

References

  1. Chen B, Wornell GW: Quantization index modulation: a class of provably good methods fordigital watermarking and information embedding. IEEE Trans Inf Theory 2001, 47(4):1423-1443. 10.1109/18.923725

    Article  MathSciNet  MATH  Google Scholar 

  2. Eggers JJ, Bauml R, Tzschoppe R, Girod B: Scalar costa scheme for information embedding. IEEE Trans Signal Process 2003, 51(4):1003-1019. 10.1109/TSP.2003.809366

    Article  MathSciNet  Google Scholar 

  3. Boyer JP, Duhamel P, Blanc-Talon J: Performance analysis of scalar DC-QIM for zero-bit watermarking. IEEE Trans Inf Foren Secur 2007, 2(2):283-289.

    Article  Google Scholar 

  4. Kalantari NK, Ahadi SM: A logarithmic quantization index modulation for perceptually better data hiding. IEEE Trans Image Process 2010, 19(6):1504-1517.

    Article  MathSciNet  Google Scholar 

  5. Pérez-Gonzàlez F, Balado F, Martin JRH: Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Trans Signal Process 2003, 51(4):960-980. 10.1109/TSP.2003.809368

    Article  MathSciNet  Google Scholar 

  6. Bartolini F, Barni M, Piva A: Performance analysis of ST-DM watermarking in presence of nonadditive attacks. IEEE Trans Signal Process 2004, 52(10):2965-2974. 10.1109/TSP.2004.833868

    Article  Google Scholar 

  7. Pérez-Gonzàlez F, Mosquera C: Quantization-based data hiding robust to linear-time-invariant filtering. IEEE Trans Inf Foren Secur 2008, 3(2):137-152.

    Article  Google Scholar 

  8. Conway JH, Sloane NJA: Sphere Packings, Lattices, and Groups. Springer, New York; 1988.

    Book  MATH  Google Scholar 

  9. Pérez-Gonzàlez F, Mosquera C, Barni M, Abrardo A: Rational dither modulation: a high-rate data-hiding method invariant to gain attacks. IEEE Trans Signal Process 2005, 53(10):3960-3975.

    Article  MathSciNet  Google Scholar 

  10. Oostveen JC, Kalker AAC, Staring M: Adaptive quantization watermarking. In Proc of SPIE: Security, Steganography, and Watermarking of Multimedia Contents VI. Volume 5306. San Jose, CA; 2004:296-303.

    Chapter  Google Scholar 

  11. Li Q, Cox IJ: Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking. IEEE Trans Inf Forens Secur 2007, 2(2):127-139.

    Article  Google Scholar 

  12. Papoulis A: Probability, Random Variables, and Stochastic Processes. McGraw-Hill, New York; 1991.

    MATH  Google Scholar 

  13. Saralees N: A generalized normal distribution. J Appl Stat 2005, 32(7):685-694. 10.1080/02664760500079464

    Article  MathSciNet  MATH  Google Scholar 

  14. Schuchman L: Dither signals and their effect on quantization noise. IEEE Trans Commun Technol 1964, CT-12: 162-165.

    Article  Google Scholar 

  15. Do MN, Vetterli M: Wavelet-based texture retrieval using generalized gaussian density and Kullback-Leibler distance. IEEE Trans Image Process 2002, 11(2):146-158. 10.1109/83.982822

    Article  MathSciNet  Google Scholar 

  16. Voloshynovskiy S, Pereira S, Iquise V, Pun T: Attack modelling: towards a second generation watermarking benchmark. Signal Process 2001, 81(Special 6):1177-1214.

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinshan Zhu.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Below are the links to the authors’ original submitted files for images.

Authors’ original file for figure 1

Authors’ original file for figure 2

Authors’ original file for figure 3

Authors’ original file for figure 4

Authors’ original file for figure 5

Authors’ original file for figure 6

Authors’ original file for figure 7

Authors’ original file for figure 8

Authors’ original file for figure 9

Authors’ original file for figure 10

Authors’ original file for figure 11

Authors’ original file for figure 12

Authors’ original file for figure 13

Authors’ original file for figure 14

Authors’ original file for figure 15

Authors’ original file for figure 16

Authors’ original file for figure 17

Authors’ original file for figure 18

Authors’ original file for figure 19

Authors’ original file for figure 20

Authors’ original file for figure 21

Authors’ original file for figure 22

Authors’ original file for figure 23

Authors’ original file for figure 24

Authors’ original file for figure 25

Authors’ original file for figure 26

Authors’ original file for figure 27

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Zhu, X., Ding, J. Performance analysis and improvement of dither modulation under the composite attacks. EURASIP J. Adv. Signal Process. 2012, 53 (2012). https://doi.org/10.1186/1687-6180-2012-53

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-6180-2012-53

Keywords