Optimal look-up table-based data hiding

Similar documents
DATA hiding technologies have been widely studied in

Distortion Compensated Lookup-Table Embedding: Joint Security and Robustness Enhancement for Quantization Based Data Hiding

Joint Security and Robustness Enhancement for Quantization Based Data Embedding

An Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions

Robust Joint Source-Channel Coding for Image Transmission Over Wireless Channels

NUMEROUS elaborate attempts have been made in the

Dual Frame Video Encoding with Feedback

Error Resilience for Compressed Sensing with Multiple-Channel Transmission

52 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 1, FEBRUARY 2005

Research Article. ISSN (Print) *Corresponding author Shireen Fathima

Spatial Error Concealment Technique for Losslessly Compressed Images Using Data Hiding in Error-Prone Channels

Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction

Bit Rate Control for Video Transmission Over Wireless Networks

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ISCAS.2005.

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

PERCEPTUAL QUALITY ASSESSMENT FOR VIDEO WATERMARKING. Stefan Winkler, Elisa Drelie Gelasca, Touradj Ebrahimi

Constant Bit Rate for Video Streaming Over Packet Switching Networks

OBJECT-BASED IMAGE COMPRESSION WITH SIMULTANEOUS SPATIAL AND SNR SCALABILITY SUPPORT FOR MULTICASTING OVER HETEROGENEOUS NETWORKS

Channel models for high-capacity information hiding in images

Digital Watermarking for Telltale Tamper Proofing and Authentication

Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting

Analysis of Packet Loss for Compressed Video: Does Burst-Length Matter?

WYNER-ZIV VIDEO CODING WITH LOW ENCODER COMPLEXITY

Color Image Compression Using Colorization Based On Coding Technique

DICOM medical image watermarking of ECG signals using EZW algorithm. A. Kannammal* and S. Subha Rani

Unequal Error Protection Codes for Wavelet Image Transmission over W-CDMA, AWGN and Rayleigh Fading Channels

MULTI WAVELETS WITH INTEGER MULTI WAVELETS TRANSFORM ALGORITHM FOR IMAGE COMPRESSION. Pondicherry Engineering College, Puducherry.

A Study of Encoding and Decoding Techniques for Syndrome-Based Video Coding

Adaptive Key Frame Selection for Efficient Video Coding

Project Proposal: Sub pixel motion estimation for side information generation in Wyner- Ziv decoder.

Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264

DELTA MODULATION AND DPCM CODING OF COLOR SIGNALS

TERRESTRIAL broadcasting of digital television (DTV)

A Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique

Scalable Foveated Visual Information Coding and Communications

Skip Length and Inter-Starvation Distance as a Combined Metric to Assess the Quality of Transmitted Video

Optimized Color Based Compression

INTRA-FRAME WAVELET VIDEO CODING

A SVD BASED SCHEME FOR POST PROCESSING OF DCT CODED IMAGES

COMPRESSION OF DICOM IMAGES BASED ON WAVELETS AND SPIHT FOR TELEMEDICINE APPLICATIONS

A New Compression Scheme for Color-Quantized Images

DWT Based-Video Compression Using (4SS) Matching Algorithm

Design Project: Designing a Viterbi Decoder (PART I)

CHAPTER 8 CONCLUSION AND FUTURE SCOPE

EMBEDDED ZEROTREE WAVELET CODING WITH JOINT HUFFMAN AND ARITHMETIC CODING

Adaptive decoding of convolutional codes

Colour Reproduction Performance of JPEG and JPEG2000 Codecs

Using Raw Speech as a Watermark, Does it work?

SCALABLE video coding (SVC) is currently being developed

WE CONSIDER an enhancement technique for degraded

AN IMPROVED WATERMARKING RESISTANCE DATA COMPRESSION ON DIGITAL IMAGES USING HAAR WAVELET ORTHONORMAL BASIS DISCRETE COSINE TRANSFORM

WITH the rapid development of high-fidelity video services

Research Article Design and Analysis of a High Secure Video Encryption Algorithm with Integrated Compression and Denoising Block

Behavior Forensics for Scalable Multiuser Collusion: Fairness Versus Effectiveness H. Vicky Zhao, Member, IEEE, and K. J. Ray Liu, Fellow, IEEE

3D MR Image Compression Techniques based on Decimated Wavelet Thresholding Scheme

Speeding up Dirac s Entropy Coder

Region Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling

AN IMPROVED ERROR CONCEALMENT STRATEGY DRIVEN BY SCENE MOTION PROPERTIES FOR H.264/AVC DECODERS

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICASSP.2016.

Linköping University Post Print. Packet Video Error Concealment With Gaussian Mixture Models

Free Viewpoint Switching in Multi-view Video Streaming Using. Wyner-Ziv Video Coding

Implementation of CRC and Viterbi algorithm on FPGA

Video coding standards

AN UNEQUAL ERROR PROTECTION SCHEME FOR MULTIPLE INPUT MULTIPLE OUTPUT SYSTEMS. M. Farooq Sabir, Robert W. Heath and Alan C. Bovik

Fast thumbnail generation for MPEG video by using a multiple-symbol lookup table

Steganographic Technique for Hiding Secret Audio in an Image

Express Letters. A Novel Four-Step Search Algorithm for Fast Block Motion Estimation

Research Topic. Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks

Performance of a Low-Complexity Turbo Decoder and its Implementation on a Low-Cost, 16-Bit Fixed-Point DSP

Copyright 2005 IEEE. Reprinted from IEEE Transactions on Circuits and Systems for Video Technology, 2005; 15 (6):

A NEW LOOK AT FREQUENCY RESOLUTION IN POWER SPECTRAL DENSITY ESTIMATION. Sudeshna Pal, Soosan Beheshti

Image Resolution and Contrast Enhancement of Satellite Geographical Images with Removal of Noise using Wavelet Transforms

Visual Communication at Limited Colour Display Capability

1. INTRODUCTION. Index Terms Video Transcoding, Video Streaming, Frame skipping, Interpolation frame, Decoder, Encoder.

A Linear Source Model and a Unified Rate Control Algorithm for DCT Video Coding

Study and Analysis of Robust DWT-SVD Domain Based Digital Image Watermarking Technique Using MATLAB

Error Resilient Video Coding Using Unequally Protected Key Pictures

Analysis of a Two Step MPEG Video System

NON-UNIFORM KERNEL SAMPLING IN AUDIO SIGNAL RESAMPLER

MULTI-STATE VIDEO CODING WITH SIDE INFORMATION. Sila Ekmekci Flierl, Thomas Sikora

UNIVERSAL SPATIAL UP-SCALER WITH NONLINEAR EDGE ENHANCEMENT

Implementation of Memory Based Multiplication Using Micro wind Software

Analysis of Different Pseudo Noise Sequences

Comparative Study of JPEG2000 and H.264/AVC FRExt I Frame Coding on High-Definition Video Sequences

Robust 3-D Video System Based on Modified Prediction Coding and Adaptive Selection Mode Error Concealment Algorithm

Image watermarking technique in MDCT domain exploiting the properties of the JND model

FAST SPATIAL AND TEMPORAL CORRELATION-BASED REFERENCE PICTURE SELECTION

Color Quantization of Compressed Video Sequences. Wan-Fung Cheung, and Yuk-Hee Chan, Member, IEEE 1 CSVT

Selective Intra Prediction Mode Decision for H.264/AVC Encoders

An Lut Adaptive Filter Using DA

ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO

FPGA Implementation of Convolutional Encoder And Hard Decision Viterbi Decoder

Image Compression Techniques Using Discrete Wavelet Decomposition with Its Thresholding Approaches

Audio-Based Video Editing with Two-Channel Microphone

BER Performance Comparison of HOVA and SOVA in AWGN Channel

Wipe Scene Change Detection in Video Sequences

ELEC 691X/498X Broadcast Signal Transmission Fall 2015

ALONG with the progressive device scaling, semiconductor

Analysis of Video Transmission over Lossy Channels

Error concealment techniques in H.264 video transmission over wireless networks

Transcription:

Published in IET Signal Processing Received on 9th December 2008 Revised on 19th December 2009 Optimal look-up table-based data hiding X. Wang X.-P. Zhang ISSN 1751-9675 Department of Electrical & Computer Engineering, Ryerson University, 350 Victoria Street, Toronto, ON, Canada M5B 2K3 E-mail: xzhang@ee.ryerson.ca Abstract: In this study, the authors present a novel data hiding scheme using the minimum distortion look-up table (LUT) embedding that achieves good distortion-robustness performance. LUT-based data hiding is a simple and efficient way to embed information into multimedia content for various applications, such as transaction tracking and database annotation. The authors find it possible to optimally reduce the data hiding-introduced distortion by designing the LUT according to the distribution of the host at a given robustness level. The authors first analyse the distortion introduced by LUT embedding and formulate its relationship with run constraints of LUT to construct an optimal coding problem. Subsequently, a Viterbi algorithm is presented to find the minimum distortion LUT. Then a new practical data hiding scheme using the optimal LUT is applied in the wavelet domain. Theoretical analysis and numerical results show that the new LUT design achieves not only less distortion but also more robustness than the traditional LUT-based data embedding schemes under common attacks such as Gaussian noise and JPEG compression. 1 Introduction Data hiding techniques have been widely used in multimedia security applications such as copyright protection, authentication and transaction tracking. Many schemes have been proposed to fulfill the design requirements of various kinds of applications 1 3]. Robustness to signal processing operations, information payload and fidelity (or embedding introduced distortion) compose the three most important conflicting goals of a data hiding system. Achieving one property in most cases means sacrificing the others. Depending on specific applications, the desired data hiding methods need to achieve the trade-off among these three requirements. In recent years, a lot of practical data hiding systems have been designed for image, video and audio and could be classified according to applications, working domain and embedding types. First, based on different robustness requirements of various applications, they can be classified into robust, fragile and semi-fragile data hiding. The copyright protection needs the scheme to be robust enough to survive malicious and non-malicious attacks. Recent robust watermarking research also focuses on different application aspects. In 4, 5], the lossless or reversible data hiding methods are discussed with application to medical recording and law enforcement. In 6], a spread spectrum watermarking scheme combined with a new perception model is presented to focus on imperceptibility requirement. On the other hand, fragile and semi-fragile techniques are fragile to some extent for the tampering detection applications. Second, different image domains including spatial domain and transform domain are available for hiding information. The data hiding in the transform domain 7, 8] can often achieve better perceptual transparency and robustness. Third, we could classify the data hiding system as non-informed and informed data embedding according to whether the information of the host is considered during embedding process. The additive spread spectrum algorithm 7, 9] belongs to the first category where the embedding process is independent of the host content. For the informed data hiding, the properties of the host are considered to force a relationship between the host signal and the information to be embedded 10, 11]. The idea is inspired by Costa s dirty paper theory 12]. Quantisation-based methods 13 15] are in this category. The most favourable advantage of these methods is host interference rejecting. In quantisation-based methods, the information is embedded into the host by choosing information associated with quantisers to quantise the host data. Look-up table (LUT) embedding is a simple and efficient quantisation-based scheme. The most popular LUT method is odd even embedding or dither modulation 13]. It is a special case of scalar quantisation-indexed modulation (QIM), which is widely known in watermarking community. In 13], the distortion compensation QIM offers better performance over QIM, but the statistics of noise needs to be known in advance. In this paper, we consider the case with unknown noise statistics. Note that the distortion compensation will improve the performance of our scheme the same as in the QIM case when the noise statistics is known. LUT-based data hiding schemes have the following two main advantages: (i) the LUT is generally easy to implement and computationally efficient, and (ii) by constraining the quantisation points in a finite set in LUT rather than an infinite set (real-valued set) in a generic QIM, we show in this paper that we can better control the robustness distortion of the embedded data. The IET Signal Process., 2011, Vol. 5, Iss. 2, pp. 171 179 171 & The Institution of Engineering and Technology 2011

process is similar to the discretisation process in digital communication. It enables us to develop a tangible ratedistortion optimisation algorithm on a finite quantisation set by taking advantage of existing communication coding and decoding methods, such as a Viterbi decoding method used in this paper. One of the most important properties of LUT is the run that is defined as the maximum number of consecutive zeros or ones in LUT. The run of the odd even method is 1. A pixel-domain LUT embedding scheme is proposed in 15], where the LUT is associated with a cryptographic key to provide security and it is a n-run LUT, that is, the maximum allowable run of the LUT is n. Wu16] indicated that n-run LUT embedding generally introduces larger distortion than the traditional odd even embedding with the same quantisation step size but provides more robustness, that is, the bit error rate (BER) can be considerably smaller. This conclusion is based on the assumption that the host data follow a uniform distribution. When the host data follow other distributions such as Gaussian, it is possible to design LUT with less distortion while maintaining the run length which is an indicator of robustness. In our previous work 17], we show that with the knowledge the host statistics, the LUT can be designed to achieve less distortion than existing schemes given a robustness constraint defined by the run length. A reduced distortion 2-run LUT is developed to achieve good robustness and distortion trade-off. However, the solution is limited to run of 2 and the distortion is reduced compared to other methods but not minimised and the method cannot be applied to arbitrary run length. In this paper, a new generic optimal LUT embedding method that minimises distortion for arbitrary run length of LUT is presented. The LUT is generated with knowledge of the information to be embedded. From the analysis of the mean squared distortion introduced by n-run LUT, we show that the distortion can be greatly reduced by designing the LUT according to the distribution of the host data and the data to be embedded. We further formulate the minimisation of the LUT distortion as a dynamic programming problem. Unlike the complex algorithm in 17], a new practical minimum distortion n-run LUT design method is presented based on a Viterbi algorithm (VA). Experimental results show that at the same watermark-tonoise ratio (WNR), the BER for minimum distortion n-run LUT embedding can be smaller than other LUT methods including the odd even LUT embedding. The rest of the paper is organised as follows. Section 2 gives a brief introduction of data hiding and LUT-based embedding. In Section 3, we analyse the distortion introduced by data embedding in the LUT scheme. The design of optimal (minimum) distortion LUT algorithm by a VA is proposed in Section 4. The optimal LUT is applied to the wavelet domain in Section 5. Experimental results with visual effects are given to demonstrate the advantage of the new LUT embedding scheme over the existing schemes in Section 6. Section 7 concludes the paper. The new method is a general scheme that can be used for any type of multimedia content since it takes advantage of the distribution information of host data as well as watermark data and optimises the embedding LUT. We use image as an example without loss of generality. Since our scheme is not targeting for particular watermarking applications, data hiding and watermarking are used interchangeably in the context. Notations in this paper are shown in Table 1. Table 1 Table of nomenclature Q( ) quantisation function T LUT t k the k-th entry of a LUT T t k 0ift k = 1, 1 if t k = 0 b bit to be embedded s b host feature/coefficient to be embedded b f b (s b ) probability density of s b D kq mean square quantisation introduced distortion of the kth cell Dist +l k, Dist 2l k, mean square LUT embedding introduced +l Dist k distortion of the kth cell when only the k + lth, only the k + lth and both the k 2 lth and the k + lth entries are the nearest entries for the desired bit Dist k (T ) n-run LUT embedding introduced distortion for the kth quantisation cell MSE quan overall quantisation introduced mean square distortion MSE w (T ) overall LUT embedding distortion when T is used D k (T ) extra LUT embedding distortion when T is used P k (T ) probability that a feature is mapped to the kth entry after LUT embedding R k (T ) robustness contribution of the kth entry when T is used 2 Overview of the LUT embedding An LUT T is a sequence of 0s and 1s, associated with a uniform quantiser. It maps every feature or pixel value of an image to a quantisation level according to the input data to be embedded. The embedding and detection process of LUT-based data hiding is shown in Fig. 1. First the host elements are quantised. A uniform quantiser with cell width q maps the original host signal to kq, k ¼ 1,..., K, where K is the size of the LUT. Note that here we assume that the signal value has already been normalised to be positive without loss of generality. Each quantiser cell, kq, carries an information bit that is represented by the corresponding kth entry in the LUT. If one bit is to be embedded into a host coefficient, the coefficient is mapped to the nearest quantisation value whose corresponding LUT entry is the same as the information bit. For example to embed a 1 in a pixel, the pixel is rounded by its quantisation value if the entry of the table corresponding to that pixel is also a 1. If the entry is not 1, we should find its nearest quantisation level for which its LUT entry is 1 to replace the pixel as illustrated in Fig. 2. The process of embedding 0 is the same. The look-up function Lookup(.) simply returns a 0 or 1 depending upon the input index Fig. 1 Lookup(I) = value in LUT at index I (1) Diagram of the LUT-based data hiding 172 IET Signal Process., 2011, Vol. 5, Iss. 2, pp. 171 179 & The Institution of Engineering and Technology 2011

calculated as Fig. 2 Example of LUT associated with a uniform quantiser D k (s b ) = s kq 2 f (s)ds (5) where f (s) is the probability density function (PDF) of s and the features to embed bit b is denoted by s b. However, if the bit to be embedded for s is not b, the host data must be mapped to the nearest quantisation point corresponding to the desired bit. There are three cases: Fig. 3 Example of the odd even embedding The LUT(.) function takes the value of the original signal as the input and maps it to a 0 or 1 according to the LUT. Thus, the LUT(.) function is actually a simple composition of the look-up and the quantisation functions LUT(s) = Lookup(Q(s)/q) (2) where q is quantisation step and Q is quantisation function. The entire process altering a pixel can be abstracted into the following formula x = { Q(s) if LUT(s) = b s + d if LUT(s) = b where s is the original feature (in this case, pixel value), x is the watermarked feature, b is the bit to be embedded and d = arg min d { d d = (Q(z) s) s.t. LUT(z) = b}. Once the LUT is known, the watermark detection can be easily implemented through a simple look-up from the LUT. The table is looked up as (3) ˆb = LUT(ˆx) (4) where ˆb is the extracted bit and ˆx is the watermarked, possibly corrupted signal. A typical LUT embedding algorithm is the odd even embedding. First, a uniform quantiser Q(.) is defined. The partition of the quantiser is shown in Fig. 3. The host pixel is mapped to the nearest even number point to embed a 0 and the nearest odd number quantisation point to embed a 1. Thus, a relationship between the information bit and the marked signal is formed. In this scheme, the LUT entries for embedding 0 and 1 are arranged in an interleaving manner. It is formulated as LUT of run length 1 in 16]. It is also noted that the LUT with larger run constraints introduces larger distortion but has better robustness and thus smaller BER. In this paper, our goal is to design LUT so as to minimise distortion while keeping the run constraints unchanged. The (k + l )th entry is the only closest entry for the desired bit; The (k 2 l )th entry is the only closest entry for the desired bit; Both the (k + 2)th and (k 2 2)th entries are the closest entries. An example of l ¼ 2 is illustrated in Fig. 4. If the (k + l )th entry is the only closest entry for the desired bit Fig. 4a], the distortion of the kth entry is D +l k = s (k + l)q 2 f (s)ds = D k (s b ) + l 2 q 2 f (s)ds 2lq (s kq)f (s)ds (6) If the feature is approximately symmetric distributed within each cell, the last term is close to 0. We have D +l k D k (s b ) + l 2 q 2 f (s)ds (7) Similarly, if the (k + l )th entry is the only one closest entry 3 Distortion analysis In LUT embedding, uniform quantisation Q(.) divides the input signal space into K levels. If the kth entry of LUT is b, to embed b the data samples of signal s in the quantisation cell of (k 2 1/2)q, (k + 1/2)q] is rounded to kq, the mean square distortion produced by this operation is Fig. 4 Illustration of distortion analysis of embedding 1 a (k + 2)th entry is the only one closest entry b (k 2 2)th entry is the only closest entry c (k + 2)th and (k 2 2)th entry are both closest entries IET Signal Process., 2011, Vol. 5, Iss. 2, pp. 171 179 173 & The Institution of Engineering and Technology 2011

for the desired bit Fig. 4b], the distortion is D l k = s (k l)q 2 f (s)ds = D k (s b ) + l 2 q 2 f (s)ds + 2lq (s kq)f (s)ds D k (s b ) + l 2 q 2 f (s)ds (8) In another case, two nearest quantisation points (k + l )q and (k 2 l )q correspond to the desired bit simultaneously Fig. 4c], then the original features in the range of (k 2 1/ 2)q, kq] are rounded to (k 2 l )q, and the features in the other half interval kq, (k + 1/2)q] are mapped to (k + l )q. The distortion will be composed by two parts kq D +l k = s (k l)q 2 f (s)ds + kq s (k + l)q 2 f (s)ds = D k (s b ) + l 2 q 2 f (s)ds kq ] (k+1/2)q + 2lq (s kq)f (s)ds (s kq)f (s)ds Similarly, it comes to D +l k D k (s b ) + l 2 q 2 kq f (s)ds lq2 2 f (s)ds (9) (10) For a binary data hiding system, features are divided into two categories: the features that are used for embedding bit 0, denoted by s 0, and features to embed bit 1, denoted by s 1. The PDFs of s 0 and s 1 are f 0 (s 0 ) and f 1 (s 1 ), respectively. Now consider that each of the K LUT entries is either 0 or 1. In all K quantisation cells, all the data have to be mapped to the closest reconstruction points for the desired entry. According to (5) (10), the overall n-run LUT T embedding distortion for the feature within the kth quantisation cell can be formulated as Dist k (T) = D k (s 0 ) + q 2 n 1 l 2 a l 0,k l ] 2 bl 0,k l=1 f (s 0 )ds 0 + D k (s 1 ) + q 2 n 1 l 2 a l 1,k l ] 2 bl 1,k l=1 f (s 1 )ds 1 (11) where T is LUT, a and b are calculated as follows a l 0,k = max{t k l t k l+1...t k...t k+l 1, t k l+1...t k...t k+l 1 t k+l } (12) a l 1,k = max{t k l t k l+1...t k...t k+l 1, t k l+1...t k...t k+l 1 t k+l } (13) b l 0,k = a l 0,kt k l t k+l (14) b l 1,k = al 1,k t k l t k+l (15) where t is entry of T. a l b,k = 1 only when t k = b, t k l or t k+l or both is the nearest LUT entry for b. b l b,k = 1 only when t k = b, t k l and t k+l are the nearest LUT entries for b. From (11), the overall distortion can be formulated as MSE w (T) = K 1 Dist k (T) (16) k=0 Considering the overall mean-squared distortion because of quantisation only is MSE quan = K 1 k=0 + = K 1 k=0 s 0 kq 2 f 0 (s 0 )ds 0 s 1 kq 2 f 1 (s 1 )ds 1 ] D kq (s 0 ) + D kq (s 1 )] The additional distortion by data hiding at the kth cell is D k (T) = q 2 n 1 l 2 a l 0,k l ] 2 bl 0,k f (s 0 )ds 0 l=1 + q 2 n 1 l 2 a l 1,k l ] 2 bl 1,k f (s 1 )ds 1 l=1 The overall embedding distortion is MSE w (T) = MSE quan + K 1 D k (T) (17) k=0 4 Minimum distortion LUT with VA The overall structure of the proposed data hiding scheme is illustrated in Fig. 5 for binary case. First, host elements are quantised using a uniform quantiser. A VA is used in order to find the optimal distortion LUT according to the watermark signal and the quantised host data described in the following paragraph. Then the optimal LUT is used as a key to quantise the host data. After that the watermarked data is transmitted through the channel. The channel could be any kind of attack or noise. At the detector side the LUT is used as a secret key in order to find the watermark inside the received data. The proposed method is a blind detection 174 IET Signal Process., 2011, Vol. 5, Iss. 2, pp. 171 179 & The Institution of Engineering and Technology 2011

Fig. 5 Optimal LUT embedding and detection process method which does not need the original image at the receiver side. Since MSE quan is the same for all n-run LUTs, that is, for all T in (17), the optimal n-run LUT is the one that minimises the additional distortion T opt = arg min T { } K 1 k=0 D k (T) (18) We formulate it as a problem of minimising K steps summation of D k (T) and it can be solved using dynamic programming. A VA 18] is used. For a n-run LUT, 2 2n 2 states is represented by the 2n 2 2 neighbouring LUT entries S = t k n+1...t k...t k+n 2 (19) In each state of the trellis, the previous state metric (SM) and the corresponding branch metric (BM) are added together, and then the accumulated SM is updated by choosing the minimum of all possible cases recursively SM k+1 S i = min S j (SM k S j + BM k+1 S j,s i ), k = 0,..., K 2 (20) where SM k S j represents the SM of the jth state at step k, and BM k S j,s i denotes the BM at step k associated with a transition from state S j to state S i. A transition happens only when the last 2n 2 3 entries of S j is the same as the first 2n 2 3 entries of S i. Fig. 6 shows the trellis of a 2-run LUT. The initial state metric SM 0 S i is given by the additional distortion of k ¼ 0. SM 0 S i = D 0 (S i ) (21) where D k (S i ) denotes the additional distortion, whereas t k n+1,..., t k,..., t k+n 1 are given by S i. Let BM k S j,s i be the additional distortion of the kth entry. Since the additional distortion of the kth entry is decided Fig. 6 Trellis of 2-run LUT Arc is traversed if the next entry is 1, a dotted arc is traversed if the next entry is 0. Because the run is 2, the BM from 00 to 00 and from 11 to 11 is 1 only by the 2n 2 1 nearby entries t k n+1,..., t k,..., t k+n 1 which can be obtained from S j and S i. Considering the case that from S j to S i will break the run n constrain, BM k S j,s i is given by a modification of the additional distortion. { BM k S j,s i = 1 if run. n from S j to S i (22) D k (S j, S i ) else where D k (S j, S i ) denotes the additional distortion while t k n+1,..., t k,..., t k+n 1 are given by S j and S i. Then the accumulated SM is the overall additional distortion for all the K entries. We can create the minimum distortion n-run LUT using the corresponding state path that minimises the accumulated SM. The algorithm could be summarised in the following steps: Step 1: Calculate the additional distortion of selecting each path BM. Step 2: Add the previous SM and the corresponding BM together and select the less distortion path of each state. Step 3: Find the minimum distortion LUT by choosing the minimum accumulated SM which is the overall additional distortion for all K entries. The complexity of the new LUT design algorithm is similar to that of the regular VA. The complexity increases linearly with the number of quantisation levels. For example, if 3-run LUT with 20 quantisation levels is used, the complexity of both embedding and decoding is the same as eight states length 20 trellis decoding. Compared against our previous reduced distortion method 17], there is no complexity increase as the reduced distortion method needs more comparison and ranking. Compare to odd even method which uses a simple odd even encoding, the complexity increase is the VA. But the performance is greatly increased over the odd even method. Also, note that all the computational complexity is in the LUT design process at the embedding end. Once the LUT has been designed, there is minimal computation cost in both watermark embedding and decoding. 5 Practical data hiding in the wavelet domain In the real image data hiding case, it is preferable to embed the information in the transform domain 19]. A new scheme that selects the large coefficients based on a Gaussian mixture model in the wavelet domain is explored in our experiment. In general, wavelet coefficients with large magnitude could survive the basic image processing and compression attacks. The wavelet coefficients could be modelled as a two-component Gaussian mixture, since the IET Signal Process., 2011, Vol. 5, Iss. 2, pp. 171 179 175 & The Institution of Engineering and Technology 2011

wavelet coefficients have a peaky, heavy-tailed marginal distribution 20, 21] and a near-zero mean. One component includes large coefficients which are singularities such as edges. The other takes small values. This statistical feature can be expressed by using a two-component Gaussian mixture model p(v i ) = p s g(v i,0,d 2 s ) + p l g(v i,0,d 2 l ) (23) p s + p l = 1 (24) where the small coefficient component is represented by subscript s and the large by l. The priori probabilities of the two are p l and p s, respectively. The variances are d s and d l. The parameters can be calculated by using the expectation-maximisation (EM) algorithm. We use the Gaussian mixture model (GMM) to find large coefficients for hiding data. The information bits are only embedded into the large wavelet coefficients. The number is mp l. 6 Experimental results with images To verify our scheme, the proposed minimum distortion LUT embedding with run constraints of 2 and 3 is applied to 20 popular 512 512 images of different types including Lena, Bridge and Goldhill in the spatial domain. The 20 images are shown in Fig. 7. For comparison purposes, given the embedding rate as one bit per pixel, the performance of the embedding scheme using the odd even LUT (i.e. the LUT with run of 1) and the average performance of LUTs with a given run are calculated. Note that the average performance of LUTs with a given run is calculated by 100 randomly generated LUTs under same run length constraints. We also calculated the average performances of all possible 2-run and 3-run LUTs, respectively. Fig. 8 shows the PSNR (peak-signal-to-noise-ratio) comparison for odd even LUT, the minimum distortion LUT, the reduced distortion LUT 17] and the average performance of the LUT embedding at different quantisation levels. As can be seen, PSNR of the new minimum distortion LUT embedding is the best at all Fig. 7 Twenty popular 512 512 images of different types 176 IET Signal Process., 2011, Vol. 5, Iss. 2, pp. 171 179 & The Institution of Engineering and Technology 2011

Fig. 8 PSNRs at different quantisation levels for the minimum distortion and odd even LUT levels, although in general longer runs are expected to generate worse PSNR than odd even LUT embedding. The new minimum distortion embedding is also much better than the average performance of the LUT embedding. When the number of quantisation level increases, the difference gets smaller. The underlying reason is that the distortion of the odd even LUT embedding gets smaller with more quantisation levels and leaves less space for improvement. It is also shown that our new minimum distortion LUT method has significant improvement over our previous reduced distortion LUT method 17], although the reduced distortion LUT does a much better job than the odd even embedding and average 2-run LUT. Next, we add white Gaussian noise to watermarked images with the minimum distortion LUT, the odd even LUT and the average LUT. The detection errors on 512 512-bit raw data at different WNR are shown in Fig. 9. Fig. 10 visualises the detection errors from which we can note the Fig. 10 The embedded images and their raw error patterns, under WNR ¼ 4.77 db. The quantisation level is 20 a The embedded image with the odd-even LUT b The embedded image with the minimum distortion 3-run LUT c The detected watermark error pattern from a] d The detected watermark error pattern from b] minimum distortion LUT has a great improvement on reducing the raw BER. The PSNR is also increased from 26.54 db of odd even to 27.30 db of minimum distortion LUT. The 3-run LUT only has slight improvement over the 2-run LUT in Fig. 9 because the distributions of the watermark data and the host data are such that the optimal 3-run LUT does not contain many 3 runs and the distortions of 2 runs dominate. As a special case, a watermark signal with 98% 0s and 2% 1s is also tested in our experiment, which often happens if a binary text watermark image is embedded. The WNR against BER performance is shown in Fig. 11. The 3-run LUT is about 1 db better than 2-run LUT. It means the long run Fig. 9 BER against WNR for the minimum distortion and odd even LUT under white Gaussian noise Quantisation level is 20 Fig. 11 BER against WNR under white Gaussian noise with an irregular distributed watermark signal IET Signal Process., 2011, Vol. 5, Iss. 2, pp. 171 179 177 & The Institution of Engineering and Technology 2011

LUT will do better with uneven embedding. Also, it is shown that the robustness performance of the reduced distortion LUT is almost the same as the minimum distortion 2-run LUT as expected as the run length is correlated to the robustness. Finally, we test our new practical data hiding in the wavelet domain. Fig. 12 shows the PSNR after embedding using our new scheme. It is the same as in the spatial domain PSNR of the minimum distortion LUT embedding is better than other LUT embedding methods at all levels. Fig. 13 shows the performance of new method against the JPEG attack. Our results are not designed specially for watermarking. Attacks are not tested thoroughly. Anyway, it can be seen from the results that our new scheme is suitable for data hiding applications that need to achieve less distortion at certain level of robustness. Also note that new minimum distortion LUT has much better PSNR (distortion) and a slightly better robustness compared to the reduced distortion LUT. Note that the main target of the algorithm is for high payload data hiding. Our embedding data rate is 1 bit/pixel or 1 bit/coefficient in the wavelet case which is much Fig. 12 PSNRs at different quantisation levels for the minimum distortion and odd even LUT using our new embedding scheme Fig. 13 BER against JPEG compression rate for the minimum distortion and odd even LUT using our new embedding scheme Quantisation level is ten greater than 1 bit/image in spread spectrum watermarking for copyright protection. The malicious attacks of watermarking are not concerns in such data hiding applications and are therefore not tested. The presented data hiding method is a host data- and watermark data-dependent method. It takes advantage of the distribution information of host data as well as watermark data and optimises the embedding LUT. The method does not depend on specific properties of images. It can therefore be applied to other types of data such as audio and video, etc. As long as the host data are not uniformly distributed, the optimised embedding LUT is better than the conventional odd even LUT. 7 Conclusion In this paper, a new optimal LUT data hiding scheme is presented to minimise the mean square distortion given certain robustness represented by the length of the run. Through the distortion analysis, we generalise the embedding distortion function and formulate the distortion minimisation problem as a dynamic programming problem. A VA is employed to find the minimum distortion LUT. Some practical considerations are also discussed. Experimental results show that our presented scheme with a run constraint larger than 1 is more robust and has less distortion than traditional LUT embedding schemes such as odd even LUT embedding in both transform and spatial domains. The presented embedding scheme is distinguished by its ability to achieve minimum distortion according to the distribution of the watermark signal. In practice, more than one near minimum distortion LUTs can be generated by choosing alternative paths to enhance the embedding security, because it makes it difficult to drive the LUT used for data hiding even if the original host data are known. The presented algorithm is suitable to optimise joint robustness, fidelity and security. Future work may include exploring optimal LUT performances that suits the requirements of human visual systems. 8 References 1 Zhu, B.B., Swanson, M.D., Tewfik, A.H.: When seeing isn t believing, IEEE Signal Process. Mag., 2004, 21, (2), pp. 40 49 2 Moulin, P., Koetter, R.: Data-hiding codes, Proc. IEEE, 2005, 93, pp. 2083 2127 3 Wu, M., Liu, B.: Multimedia data hiding (Springer-Verlag Publisher, 2002) 4 Ni, Z., Shi, Y., Ansari, N., Wei, S., Sun, Q., Xiao, L.: Robust lossless image data hiding designed for semi-fragile image authentication, IEEE Trans. Circuit Syst. Video Technol., 2008, 18, (4), pp. 497 509 5 Kuo, W.-C., Jiang, D.-J., Huang, Y.-C.: A reversible data hiding scheme based on block division. CISP 08, Hainan, China, 27 30 May 2008, vol. 1, pp. 365 369 6 Ghouti, L., Bouridane, A., Ibrahim, M., Boussakta, S.: Digital image watermarking using balanced multiwavelets, IEEE Trans. Signal Process., 2006, 54, (4), pp. 1519 1536 7 Xia, X.-G., Boncelet, C., Arce, G.: A multiresolution watermark for digital images. Proc. Int. Conf. Image Processing, October 1997, pp. 548 551 8 Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B., Chandrasekaran, S.: Robust image-adaptive data hiding using erasure and error correction, IEEE Trans. Image Process., 2004, 13, pp. 1627 1639 9 Hartung, F., Su, J., Girod, B.: Spread spectrum watermarking: malicious attacks and counterattacks. Proc. SPIE Security and Watermarking of Multimedia Contents, January 1999 10 Podilchuk, C., Zeng, W.: Image-adaptive watermarking using visual models, IEEE J. Sel. Areas Commun., 1998, 16, (4), pp. 525 539 11 Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B., Chandrasekaran, S.: Robust image-adaptive data hiding using erasure and error correction, IEEE Trans. Image Process., 2004, 13, (12), pp. 1627 1639 178 IET Signal Process., 2011, Vol. 5, Iss. 2, pp. 171 179 & The Institution of Engineering and Technology 2011

12 Costa, M.: Writing on dirty paper, IEEE Trans. Inf. Theory, 1983, IT-29, pp. 439 441 13 Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Trans. Inf. Theory, 2001, 47, pp. 1423 1443 14 Chen, B., Wornell, G.: An information-theoretic approach to the design of robust digital watermarking systems. Proc. Int. Conf. Acoustics, Speech Signal Processing, 1999, vol. 4, pp. 2061 2064 15 Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. Proc. Int. Conf. Image Processing, Santa Barbara, CA, 1997, vol. 2, pp. 680 683 16 Wu, M.: Joint security and robustness enhancement for quantization based data embedding, IEEE Trans. Circuit Syst. Video Technol., 2003, 13, pp. 831 841 17 Zhang, X.-P., Li, K., Wang, X.: A novel look-up table design method for data hiding with near minimum distortion, IEEE Trans. Circuit Syst. Video Technol., 2008, 18, (6), pp. 769 776 18 Viterbi, A., Omura, J.: Principles of digital communication and coding processes (McGraw-Hill, New York, 1979) 19 Kundur, D., Hatzinakos, D.: A robust digital image watermarking method using wavelet-based fusion. Proc. Int. Conf. Image Processing, 26 29 October 1997, vol. 1, pp. 544 547 20 Romberg, J., Choi, H., Baraniuk, R.: Bayesian tree-structured image modeling using wavelet-domain hidden Markov models, IEEE Trans. Image Process., 2001, 10, (7), pp. 1056 1068 21 Yuan, H., Zhang, X.-P.: Multiscale fragile watermarking based on the Gaussian mixture model, IEEE Trans. Image Process., 2006, 15, (10), pp. 3189 3200 IET Signal Process., 2011, Vol. 5, Iss. 2, pp. 171 179 179 & The Institution of Engineering and Technology 2011