Session: IMDSP-P7
Time: 1:00 - 3:00, Friday, May 11, 2001
Location: Exhibit Hall Area 4
Title: Image and Video Authentication and Watermarking
Chair: Ioannis Pitas

1:00, IMDSP-P7.1
DATA HIDING IN HALFTONE IMAGES BY STOCHASTIC ERROR DIFFUSION
O. AU, M. FU
In this paper, we propose a novel method called DHSED to hide binary visual patterns in two error diffused halftone images. While one halftone image is only a regular error diffused image, stochastic error diffusion is applied to the other image to generate special stochastic characteristics with respect to the first image such that the visual pattern would appear when the two halftone images are overlaid. Simulation results show that the two halftone images have good visual quality, and the hidden pattern appears with "normal" and "lower-than-normal" intensity when the two halftone images are overlaid.

1:00, IMDSP-P7.2
ANALYSIS OF WATERMARKING SYSTEMS IN THE FREQUENCY DOMAIN AND ITS APPLICATION TO DESIGN OF ROBUST WATERMARKING SYSTEMS
A. MIYAZAKI, A. OKAMOTO
This paper aims to design robust watermarking systems in the frequency domain. We first present the general model of watermark embedding and extracting processes and carry out their analysis. Then we examine the robustness of the watermarking system against common image processing and clarify the reason why detection errors occur in the watermark extracting process. Based on the result, we improve the watermark extracting process and design the robust watermarking systems. The improvement is accomplished using deconvolution filter and neural network techniques. Numerical experiments using the DCT-based watermarking system show good performance as we expected.

1:00, IMDSP-P7.3
ROBUST SPATIAL IMAGE WATERMARKING USING PROGRESSIVE DETECTION
A. TEFAS, I. PITAS
A novel method for image watermarking robust to geometric distortions is proposed. A binary watermark is embedded in a grayscale or a color host image. The ability of progressive watermark detection enables fast and robust watermark detection even after several geometric distortions of the watermarked image. Simulation results indicate the ability of the proposed method to deal with the aforementioned attacks. Experiments conducted using the StirMark Benchmarking tests, indicate the superiority of the proposed method.

1:00, IMDSP-P7.4
BLIND WATERMARKING APPLIED TO IMAGE AUTHENTICATION
J. EGGERS, B. GIROD
To prevent image manipulations and fraudulent use of modified images, the embedding of semi-fragile digital watermarks into image data has been proposed. The watermark should survive modifications introduced by random noise or compression, but should not be detectable from non-authentic regions of the image. The original image cannot be used by the watermark detector to verify the authenticity of the image. In this paper, we investigate the application of a recently developed quantization based watermarking scheme to image authentication. The watermarking technology, called Scalar Costa Scheme (SCS), allows reliable blind watermark detection from a small number of pixels, and thus enables the detection of local modifications to the image content. http://www.lnt.de/~eggers/publications.html

1:00, IMDSP-P7.5
EFFECT OF JPEG COMPRESSION ON IMAGE WATERMARK DETECTION
M. XIA, B. LIU
Compression on a watermarked image can significantly affect the detection of the embedded watermark. To show that a particular watermarking scheme is robust against compression, simulation is often relied upon. In this paper, we investigate this problem analytically. We first characterize the noise introduced by JPEG compression. We then propose a maximum a posteriori (MAP) detector, analyze its performance, and demonstrate that it has superior performance over the correlation detector.

1:00, IMDSP-P7.6
SET PARTITIONING IN OBLIVIOUS DATA HIDING
L. GANG, M. RAMKUMAR, A. AKANSU
In the oblivious steganography, host noise suppression is a great concern. Watermark signal energy is usually much less than that of the host signal. In this paper, we model the data hiding as a more general H0/H1 hypothesis testing problem. Decision making is based on the statistical distinction between H0 and H1. A simple embedding scheme, viz., set partitioning, is proposed. The coefficients are divided into two sets to represent bit value 1 and 0. Its performance is discussed. Experiments show improvement over existing schemes.

1:00, IMDSP-P7.7
BERNOULLI SHIFT GENERATED CHAOTIC WATERMARKS: THEORETIC INVESTIGATION
S. TSEKERIDOU, V. SOLACHIDIS, N. NIKOLAIDIS, A. NIKOLAIDIS, A. TEFAS, I. PITAS
The paper statistically analyzes the behaviour of chaotic watermark signals generated by n-way Bernoulli shift maps. For this purpose, a simple blind copyright protection watermarking system is considered. The analysis involves theoretical evaluation of the system detection reliability, when a correlator detector is used. The aim of the paper is twofold: (i) to introduce the n-way Bernoulli shift generated chaotic watermarks and theoretically contemplate their properties with respect to detection reliability and (ii) to theoretically establish their potential superiority against the widely used pseudorandom watermarks. Experimental verification of the theoretical analysis results is also performed.

1:00, IMDSP-P7.8
A NEW INTERPRETATION OF DATA HIDING CAPACITY
C. CANDAN, N. JAYANT
We present a new definition of data hiding capacity which complements the established theory in the field and produces practical estimates under many attacks. We discuss the relation between the proposed definition and the current theoretical work on data hiding capacity. The definition proposed is applied to still images to estimate the hiding capacity of a particular image under attacks such as JPEG compression and additive noise.

1:00, IMDSP-P7.9
INDEPENDENT COMPONENT ANALYSIS APPLIED TO DIGITAL IMAGE WATERMARKING
F. GONZALEZ-SERRANO, H. MOLINA-BULLA, J. MURILLO-FUENTES
The authors propose a new solution to the watermarking of images. This approach uses Independent Component Analysis (ICA) to project the image into a basis with its components as statistically independent as possible. The watermark is then introduced in this representation of the space. Thus, the change of basis is the key of the steganography problem. The algorithm applied to the fragile watermarking problem locates any change in the image since it also applies to the watermark. The problem of robust watermarking is also addressed from this new point of view. Some results are included to illustrate the method. http://alcaudon.tsc.uc3m.es/~murillo/