• Aucun résultat trouvé

A Novel Embedding Technique for Dirty Paper Trellis Codes Watermarking

N/A
N/A
Protected

Academic year: 2022

Partager "A Novel Embedding Technique for Dirty Paper Trellis Codes Watermarking"

Copied!
1
0
0

Texte intégral

(1)

Valumetric scaling attack Jpeg attack

Gaussian noise attack Gaussian filtering attack

Evaluation Protocol:

100 images 256×256 from BOWS-2 data-base.

Payload = 1 bit embedded in 64 pixels = 1024 bits.

Trellis: Output arc labels = Gaussian distribution, Number of labels by output arc = 12.

Three competing algorithms

(average embedding PSNR = 42.4 dB):

Original DPTC (Monte-Carlo in DCT- 64 states, 64 arcs/state),

RB-DPTC (rotation-based - wavelet - 128 states, 128 arcs/state),

Lin cone-based (wavelet - 128 states, 128 arcs/state), average PSNR = 34.2 dB!

A Novel Embedding Technique

for Dirty Paper Trellis Codes Watermarking

Marc CHAUMONT

LIRMM, UMR CNRS 5506, University of Nîmes, University of Montpellier II marc.chaumont@lirmm.fr

Few words about Dirty Paper Trellis Codes (DPTC):

Security weakness (Kerckhoffs's framework).

Code book estimable on a simplified version [2].

High computational complexity of the Embedding part Lin et al. [3] solution is not enough satisfying in

term of robustness-distortion tradeoff.

DCT artifacts.

[1] “Applying Informed Coding and Informed Embedding to Design a Robust, High Capacity Watermark”, Miller, Doërr, and Cox, IEEE TIP 2004.

[2] “Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes”, Bas and Doërr, MM&Sec'2008.

[3] “An Efficient Algorithm for Informed Embedding of Dirty Paper Trellis Codes for Watermarking”, Lin, Cox, Doërr, and Miller, ICIP'2005.

[4] “Fast Embedding Technique For Dirty Paper Trellis Watermarking”, Chaumont, IWDW’2009.

[5] “Broken Arrows”, Furon and Bas, EURASIP Journal on Information Security, 2008.

[6] “Psychovisual Rotation-based DPTC Watermarking Scheme”, Chaumont, EUSIPCO’2009.

The original DPTC algorithm [1]:

Our RB-DPTC algorithm:

Use of a secret space [4] (projection onto secret carriers as in Broken Arrows algorithm [5]).

Use of a fast embedding approach (rotation-based).

Embedding in the wavelet domain.

Rotation-based DPTC:

Fig: General scheme of the RB-DPTC

This investigation was supported by the VOODDO project which is a French national project of the ANR (Agence Nationale de la Recherche) "Contenu et Interaction". We would also like to thank the Languedoc-Roussillon Region.

Results and Conclusions:

01000101010001...message

Informed coding:

Identical to [1] (Trellis + Viterbi)

Input = (vx and message),

Output = codeword c*

Nsec

vx

Nsec

vw Informed embedding:

1. Compute the “Miller, Cox, Bloom plane” i.e. the orthonormalized base (v1, v2):

.

2. Obtain a Voronoï frontier (angle f) by an iterative dichotomous approach.

3. Rotate vx in the “Miller, Cox, Bloom plane” and

penetrate inside the Voronoï region of an oriented angle equals to .

Then vw = vy - vx

c*

vx

Conclusion:

Secret space owning good properties

psychovisual, channel, super-robustness;

• Good rotation-based embedding strategy

• low computational complexity,

• good robustness-distortion tradeoff,

• as secure as the original DPTC;

• Good performances (except against jpeg attack)

Tackled problems:

• Computational projections complexity [4],

• Psychovisual space [6].

• Robustness to jpeg,

• Robustness to Westfeld regression attack,

• Security analysis,

Open problems:

Relation between SSIM and penetration angle,

Robust psychovisual mask,

Comparison with quantized approaches, …

Références

Documents relatifs

In this paper, we present a new low-complexity sub-optimal decoding algorithm using the dual trellis, namely the dual Max-Log-MAP algorithm, suited for high coding rate

By contrast to verbs like tell or guess, verbs like agree or be certain are not only non-veridical with respect to that-complements, but also with respect to embedded questions.

9 Average PSNR results obtained by the proposed joint scheme for different step size values on 200 images of size 512 x

The original DPTC algorithm is known for its good robustness and its high embedding payload but own two strong weaknesses: the informed embedding step uses a Monte Carlo approach

Trois algorithmes sont en compétition pour un PSNR d’insertion proche de 42.6 dB : le DPTC original (dans l’espace DCT) avec un PSNR moyen d’insertion = 42.6 dB, l’algorithme de

[3] « An Efficient Algorithm for Informed Embedding of Dirty Paper Trellis Codes for Watermarking », Lin, Cox, Doërr, and Miller, ICIP'2005.... Calculer le plan de “Miller,

We conclude that in order to achieve the projection onto carriers, one should use random SDM since it is linear in complexity and it gives better robustness results than the

[3] “An Efficient Algorithm for Informed Embedding of Dirty Paper Trellis Codes for Watermarking”, Lin, Cox, Doërr, and Miller, ICIP'2005. [4] “A Novel Embedding Technique for