The present invention relates generally to media data hiding, and more particularly, to a method for enhancing spread spectrum watermarking.
The proliferation of digitized media is creating a pressing need for techniques that protect copyright owners. Watermarking is a known technique for protecting copyright owners. Watermarking is a process of hiding information in digitized media for purposes of ownership verification and content protection. As expected, introduction of distortion into the host data during watermark embedding is unavoidable; nevertheless, it is usually favorable to have host data that is perceptually indistinguishable from its original form after embedding the watermark.
One well known watermarking technique is based on spread spectrum communications. In spread spectrum communications, a narrowband signal is transmitted across a wider carrier frequency band such that the signal energy present in any single frequency is undetectable. Similarly, a watermark may be embedded in host media data by spreading the embedded data over a large frequency band. Spread spectrum watermark is designed to be difficult (preferably virtually impossible) to remove from the host signal without rendering the host signal useless for its intended purposes and without imposing any perceptual artifacts introduced by the inserted watermark.
In an article by Ingemar J. Cox et al., entitled “Secured Spectrum Watermarking for Multimedia” in IEEE Transactions on Image Processing, Vol. 6, No. 12, December 1997, as well as U.S. Pat. No. 5,930,369 by Cox et al, entitled “Secure spread spectrum watermarking for multimedia data”, spread spectrum watermarking is described which embeds a pseudo-random noise sequence into digital data for watermarking purposes. Extraction of watermark requires the availability of the original image. In U.S. Pat. No. 5,848,155 by Cox et al, entitled “Spread spectrum watermark for embedded signaling”, the watermark is extracted from watermarked data without the use of an original or unwatermarked version of the data. This approach overcomes the limitations of the prior systems by using spread spectrum technology to embed watermark data or information into predetermined locations in an image.
In accordance with the present invention, an improved method is provided for spread spectrum watermarking. The improved watermarking method includes: receiving host data which is expressed in a transform domain by a plurality of host transform parameters; reducing variance between the plurality of host transform parameters, thereby forming an enhanced sequence of host transform parameters; and adding a watermark to the enhanced sequence of host transform parameters using a spread spectrum technique. The enhanced sequence of host transform parameters may be formed by sorting the plurality of host transform parameters in at least one of an ascending order or descending order; determining a difference for each pair of consecutive host transform parameters, and alternating the sign of every other difference value, thereby forming the enhanced sequence of host transform parameters. The present invention is applicable to the watermarking of various types of digital data stream, such as audio, image video, software and multimedia.
For a more complete understanding of the invention, its objects and advantages, reference may be had to the following specification and to the accompanying drawings.
Spread spectrum watermarking is a well known technique for embedding watermark data into digitized media. Further explanation of this technique may be found in technical resources, including an article by Ingemar J. Cox et al entitled “Secure Spread Spectrum Watermarking for Multimedia” in IEEE Transactions on Image Processing, Vol. 6, No. 12, December 1997 which is incorporated by reference herein. However, a mathematical description of spread spectrum watermarking is provided below as a basis for understanding the present invention.
Assume that we are going to embed a single bit bε{1,−1} into a host signal sequence x=x1,x2, . . . , xN. Further assume that k=k1,k2, . . . , kN is the watermark key which is randomly selected but known to the watermark detector, where kiε{1,−1},1≦i≦N and that each individual sample of the key is zero mean and independent to each other. Let Δ=Δ1,Δ2, . . . , ΔN be the scaling sequence that determines the amount of distortion added to the host sequence, where Δi≧0, 1≦i≦N, and finally the watermarked signal is x′=x1′, x2′, . . . , xN′, where xi′=xi+bΔiki,1≦i≦N.
To decode the watermark, we start with {circumflex over (x)}i=x1′+ni, which is a noisy version of xi′, where n=n1,n2, . . . , nN is some additive noise sequence introduced in the watermarked signal processing, transformation, or intentional watermark attacks. Define
then an estimate of the embedded information {circumflex over (b)} can be formed as {circumflex over (b)}=sign (D).
If we assume that x, k, Δ, and n are independent to each other and that
Since {overscore (D)}=bE[Δ] and E[Δ] is positive, {circumflex over (b)}=sign (D) indeed gives an appropriate estimate of b. Furthermore, the larger the value of
the more certain the estimate will be. In the absence of noise,
In the presence of noise
which is also proportional to 1/σx. Hence, the smaller the host signal variance, the more accurate the abstraction of watermark, the more robust the watermarking scheme.
Upon receiving the host signal at step 12, the host transform parameters (e.g. frequency coefficients) may be sorted in an ascending at step 14 to obtain xs
Next, an enhanced sequence of host transform parameters is formed by determining the difference for each pair of consecutive host transform parameters at step 16, and then alternating the sign of every other difference value at step 18. In other words, the enhanced sequence y=y1, y2, . . . , yN/2, is derived in accordance with yj=(−1)j(xs
Lastly, a watermark is added to the enhanced sequence of host transform parameters at step 20 using well known spread spectrum techniques. For example, let the watermark key be k=k1,k2, . . . , kN/2, kiε{−1,1}, and the embedding bit be b. That is, yn′=yn+bknΔn. One skilled in the art will readily recognize that this technique may be extended to embed a plurality of bits into the host signal. As in ordinary spread spectrum technique, Δn controls the amount of distortion that can be added to yn which should be guided by perceptual model if the host media data is perceptual data. Since yn=(−1)n(xs
To decode the watermark, we first form an estimate ŷ=ŷ1,ŷ2, . . . , yN/2 with the help of the sorting indices s1,s2, . . . , sN. The embedded bit {circumflex over (b)} is then the sign of Σn=1N/2knŷn, as in an ordinary spread spectrum watermark. During decoding, it is understood that the sorting indices and the watermark key are required. Instead of transferring them separately, it is envisioned that the sorting indices and the watermark can be combined into a single signal dependent key which is in turn transmitted to the decoder.
Compression and transcoding of digital media are often needed for various applications, including delivery through a different communication channel of different bandwidth and use in different devices. For example, an audio is compressed using MPEG II AAC schemes or a compressed audio in MPEG II AAC format is transcoded to MPEG I layer 3, MP3, format. Such reconstruction of the media signal via compression or transcoding can be lossy. In general, this does not alter the signal perceptibility. In many applications, it is often desirable that the embedded watermark survives such lossy reconstruction as well as other types of lossy signal processing and it should remain detectable within the reconstructed media signal.
In the exemplary encoder 30, the compressed audio data 32 is input into a partial decoder 34. The partial decoder is in turn operable to partially decode the compressed data to recover a plurality of quantization indices. Rather than embed a watermark into frequency coefficients, the watermark will be embedded into the quantization indices. Since no dequantization or requantization is necessary, this approach increases the speed of the overall process. However, it is envisioned that embedding a watermark into the frequency coefficients is also within the scope of the present invention.
The quantization indices from the compressed audio data are then input into an index selector 36. The index selector 36 applies perceptual modeling to estimate the maximum amount of distortion that can be withstood by each quantization index. Perceptual modeling is generally known to those in the art. However, perceptual modeling information is not easily accessible from compressed audio, and thus a heuristic approach may be used to apply perceptual modeling to quantization indices. Further implementation details for an exemplary heuristic approach are disclosed in U.S. patent application entitled “Method and Apparatus for Embedding Data in Compressed Audio Data Stream” filed on Feb. 25, 2002 by the assignee of the present invention which is incorporated herein by reference. In any event, selected quantization indices are output by the index selector 36.
Prior to adding a watermark, the selected quantization indices may be enhanced as described above. To do so, the selected quantization indices are sorted in either of an ascending order or descending order by the index sorter 38. The sorted quantization indices then serve as an input to an enhanced index sequencer 40. The enhanced index sequencer 40 computes a difference for each pair of consecutive quantization indices, and alternates the sign of every other quantization index, thereby forming an enhanced sequence of quantization indices.
A watermark encoder 42 adds a watermark to the enhanced sequence of quantization indices using well known spread spectrum techniques. In addition to the enhanced sequence of quantization indices, the watermark encoder 40 receives as input watermark data and watermark key data. Lastly, the watermarked quantization indices are compressed with a Hoffman coding by a partial encoder 46 to form a compressed watermarked audio signal.
The exemplary audio encoder 30 may optionally include a key multiplexer 44. As noted above, the decoding process requires the watermark key as well as the sorting indices from the index sorter 38. The key multiplexer 44 combines watermark key with the sorting indices to form a single decoding key. A corresponding audio decoder 50 is depicted in
The foregoing discloses and describes merely exemplary embodiments of the present invention. One skilled in the art will readily recognize from such discussion, and from accompanying drawings and claims, that various changes, modifications, and variations can be made therein without departing from the spirit and scope of the present invention.
| Number | Name | Date | Kind |
|---|---|---|---|
| 5073925 | Nagata et al. | Dec 1991 | A |
| 5450490 | Jensen et al. | Sep 1995 | A |
| 5748783 | Rhoads | May 1998 | A |
| 5778102 | Sandford, II et al. | Jul 1998 | A |
| 5809139 | Girod et al. | Sep 1998 | A |
| 5848155 | Cox | Dec 1998 | A |
| 5893067 | Bender et al. | Apr 1999 | A |
| 5905800 | Moskowitz et al. | May 1999 | A |
| 5915027 | Cox et al. | Jun 1999 | A |
| 5930369 | Cox et al. | Jul 1999 | A |
| 6483927 | Brunk et al. | Nov 2002 | B1 |
| 6608911 | Lofgren et al. | Aug 2003 | B1 |
| 6625297 | Bradley | Sep 2003 | B1 |
| 6650762 | Gibson et al. | Nov 2003 | B1 |
| 6674873 | Donescu et al. | Jan 2004 | B1 |
| 6798893 | Tanaka | Sep 2004 | B1 |
| 6990213 | Donescu | Jan 2006 | B1 |
| 20020131617 | Pelly et al. | Sep 2002 | A1 |
| Number | Date | Country | |
|---|---|---|---|
| 20030161550 A1 | Aug 2003 | US |