CUI Xin, YAN Bin, JIA Xia, WANG Ya-fei
(College of Information and Electrical Engineering, Shandong University of Science and Technology, Qingdao 266590, China)
Abstract: Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications, but it is inherently fragile against amplitude scaling attacks. In order to resist desynchronization attacks of QIM digital watermarking, a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed, and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework. Using the theory of iterative estimation and decoding, the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark. The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise. For constant amplitude scaling attacks, the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters. The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization.
Key words: digital watermarking; quantization index modulation (QIM); message passing algorithm based on factor graph; low density parity check (LDPC) code; amplitude scaling attack
CLD number: TP309.2 Document code: A
Article ID: 1674-8042(2014)01-0037-04 doi: 10.3969/j.issn.1674-8042.2014.01.008
References
[1] Cox I J, Miller M L, Bloom J A. Digital watermarking. Beijing: Publishing House of Electronics Industry, 2002: 78-103.
[2] Moulin P, Briassouli A, Malvar H. Detection-theoretic analysis of desynchronization attacks in watermarking. In: Proceedings of the 14th International Conference on Digital Signal Processing, Santorini, Greece, 2002, 1: 77-84.
[3] Sadasive S, Moulin P. A message passing approach to combating desynchronization attacks. IEEE Transactions on Information Forensics Security, 2011, 6(6): 1-13.
[4] Loeliger H A. An introduction to factor graphs. IEEE Signal Processing Magazine, 2004, 21(1): 28-41.
[5] Loeliger H A, Dauwels J, HU Jun-li, et al. The factor graph approach to model-based signal processing. In: Proceedings of the IEEE, 2007, 95: 1295-1322. [doi:10.1109/JPROC.2007.896497]
[6] Dauwels J H G. On graphical models for communications and machine learning: algorithms, bounds, and analog implementation. Series in Signal and Information Processing, 2006, 17: 100-150.
[7] Chen B, Wornel G W. Preprocessed and post-processed quantization index modulation methods for digital watermarking. In: Proceedings of International Society for Optics and Photonics: Security and Watermarking of Multimedia Contents II, 2000, 3971: 48-59.
[8] Borne D V D, Kalker T, Willems F. Codes for writing on dirty paper. In: Proceedings of the 23rd Symposium on Information Theory, Benelux, 2002: 45-52.
[9] Perez-Gonzalez F, Hernandez J R, Balad F. Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications. Signal Processing, 2011, 81: 1215-1238.
[10] Johnson S J. Iterative error correction. UK: Cambridge University Press, 2010: 34-279.
基于 LDPC 编码辅助和消息传递的抗幅度
缩放攻击 QIM 数字水印算法
崔鑫, 颜斌, 贾霞, 王亚菲
(山东科技大学 信息与电气工程学院, 山东 青岛 266590)
摘要:基于量化索引调制(QIM)的数字水印系统, 被越来越广泛地应用于数字水印信号的嵌入和提取, 但是它对于幅度缩放攻击有明显的脆弱性。 本文结合 LDPC 编码辅助和消息传递算法进行水印信号的提取和参数估计, 改善了 QIM 数字水印系统的性能。 对于固定幅度缩放攻击, 本文提出的算法比利用重复码编码辅助的消息传递算法, 更接近于脏纸码代码香农限。
关键词:数字水印; 量化索引调制; 基于因子图的消息传递算法; LDPC 码; 抗幅度缩放攻击
引用格式:CUI Xin, YAN Bin, JIA Xia, et al. QIM digital watermarking based on LDPC code and message passing under scaling attacks. Journal of Measurement Science and Instrumentation, 2014, 5(1): 37-40. [doi: 10.3969/j.issn.1674-8042.2014.01.008]
[full text view]