The Parallel-Gaussian Watermarking Game
合集下载
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
2
Notation. We use capital letters to denote random variables, small letters to denote their individual values, and a superscript N to denote length-N vectors. We let I (X ; Y ) denote the mutual information between two random variables X and Y , and I (X ; Y |Z ) denote the conditional mutual information between X and Y , conditioned on Z . The mean and variance of a random 2 , respectively. The symbol E [·] denotes mathematical variable X are generally denoted by µx and σx expectation.
∗
December 16, 2000. Revised, January 2, 2002, August 28, 2003 and September 12, 2003
Abstract Rates of reliable transmission of hidden information are derived for watermarking problems involving parallel Gaussian sources, which are often used to model host images and audio signals. Constraints are imposed on the average squared-error distortion that can be introduced by the information hider and by the attacker. When distortions are measured with respect to the original host data, the optimal covert and attack channels are two banks of Gaussian test channels. The solution to the watermarking game involves an optimal allocation of distortions by the information hider and by the attacker to the different channels. A fast algorithm is given for computing the optimal solution based on duality theory. For each channel we derive analytical expressions for two asymptotic regimes: weak and strong host signals. Finally we extend these results to the class of stationary Gaussian host signals with bounded, continuous spectral density. The analysis also provides an upper bound on watermarking capacity for non-Gaussian host signals.
Index terms: Watermarking, game theory, channel capacity, rate-distortion theory, parallel Gaussian channels, random processes.
∗ Work supported by NSF grants CCR 00-81268 and CDA 96-24396, and presented in part at the Proc. Conf. on Info. Syst. and Sci., Baltimore, MD, March 2001.
1
1
Introduction
The widespread dissemination of images, video, audio and text data on public communication networks raises intellectual-property and security issues that can be addressed using watermarking and data hiding techniques. Other applications of data hiding include closed captioning and embedding of text and audio in images and video. These areas have seen the development of a plethora of algorithms in the last five years [1, 2, 3], but an information-theoretic treatment of the problem is just emerging [4]—[10]. In particular, a theory has recently been developed to establish the fundamental limits of the watermarking (data hiding) proቤተ መጻሕፍቲ ባይዱlem depicted in Fig. 1 [4, 5]. In this framework, a message M is to be embedded in a length-N sequence S N = (S1 , · · · , SN ) termed host data set, typically data from a host image, video, or audio signal. The embedding is done using side information K N = (K1 , · · · , KN ) such as a cryptographic key or side information about the host signal. The resulting watermarked data X N = (X1 , · · · , XN ) = fN (S N , M, K N ) are subject to attacks that attempt to remove any trace of M from X N . The output of the attack is a sequence Y N = (Y1 , · · · , YN ). The decoder has access to Y N and K N and produces an estimate ˆ = φN (Y N , K N ) for the message that was transmitted. M The watermarking system should satisfy two basic requirements. The first is usually referred to as transparency, or unobtrusiveness: the data set X N should be similar to S N , according to a suitable distortion measure. The second requirement is referred to as robustness: the hidden message should survive the application of any attack (within a certain class) to X N . For instance, there is typically a limit on the amount of distortion that an attacker is willing to introduce. A watermarking system can be analyzed by defining a statistical model for S N and K N , a distortion function, and specifying constraints on the admissible distortion levels for the information hider and the attacker. In particular, we seek the capacity of the system, i.e., the maximum rate of reliable transmission for M , over any possible watermarking strategy and any attack that satisfy the specified constraints. Following a brief review of background in Sec. 2, three related problems are considered in this paper. First, in Sec. 3, capacity expressions are derived for Gaussian channels when all distortions are evaluated with respect to the host data, extending earlier work in which distortions were evaluated with respect to the watermarked signal [5, 10]. The solution serves as a building block for the second problem, described in Secs. 4 and 5. There the source S is decomposable as a parallel-Gaussian source with K channels. In typical applications, S would be a K -dimensional block of transform data (such as an 8 × 8 block of discrete cosine transform coefficients, or a subtree of wavelet coefficients) from an host image, video, or audio signal. In the third problem (Sec. 6), the source S is a stationary Gaussian random process with bounded and continuous spectral density. The paper concludes with a discussion in Sec. 7.
The Parallel-Gaussian Watermarking Game
Pierre Moulin and M. Kıvan¸ c Mıh¸ cak University of Illinois Beckman Inst., Coord. Sci. Lab & ECE Dept. 405 N. Mathews Ave., Urbana, IL 61801 Email: moulin@ifp.uiuc.edu