Tracing Watermarking for Multimedia Communication Quality Assessment

Similar documents
Data Hiding in Video

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

FRAGILE WATERMARKING USING SUBBAND CODING

Image and Video Watermarking

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Robust Image Watermarking based on DCT-DWT- SVD Method

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Quality Estimation of Video Transmitted over an Additive WGN Channel based on Digital Watermarking and Wavelet Transform

Digital Image Watermarking Using DWT Based DCT Technique

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami

Multimedia Security: So What s the Big Deal?

QUANTIZATION WATERMARKING IN THE JPEG2000 CODING PIPELINE

A blind Wavelet-Based Digital Watermarking for Video

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Speech Modulation for Image Watermarking

A Blind Wavelet-Based Digital Watermarking for Video

Optical Storage Technology. MPEG Data Compression

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.

Scalable Multiresolution Video Coding using Subband Decomposition

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Image Authentication and Recovery Scheme Based on Watermarking Technique

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

A new wavelet based logo-watermarking scheme

CERIAS Tech Report

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Robust Video Watermarking for MPEG Compression and DA-AD Conversion

ADAPTIVE PICTURE SLICING FOR DISTORTION-BASED CLASSIFICATION OF VIDEO PACKETS

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS

CHAPTER-4 WATERMARKING OF GRAY IMAGES

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

VIDEO COMPRESSION STANDARDS

JPEG 2000 vs. JPEG in MPEG Encoding

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

EE Low Complexity H.264 encoder for mobile applications

Image Error Concealment Based on Watermarking

Enhancing the Image Compression Rate Using Steganography

Towards a Telltale Watermarking Technique for Tamper-Proofing

On domain selection for additive, blind image watermarking

Copy Protection for Multimedia Data based on Labeling Techniques

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques

A Robust Image Hiding Method Using Wavelet Technique *

MANY image and video compression standards such as

Design and Development of BFO Based Robust Watermarking Algorithm for Digital Image. Priyanka*, Charu Jain** and Geet Sandhu***

Performance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Digital watermarking techniques for JPEG2000 scalable image coding

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

An Efficient Digital Watermarking Scheme for Dynamic Estimation of Wireless Channel Condition

Combined Hashing/Watermarking Method for Image Authentication

Digital Image Watermarking Scheme Based on LWT and DCT

QR Code Watermarking Algorithm based on Wavelet Transform

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

Audio Watermarking using Empirical Mode Decomposition

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

EMBEDDING WATERMARK IN VIDEO RECORDS

World Academy of Science, Engineering and Technology International Journal of Electronics and Communication Engineering Vol:4, No:8, 2010

Sign-up Sheet posted outside of my office HFH 1121

A Video Watermarking Algorithm Based on the Human Visual System Properties

AN AUDIO WATERMARKING SCHEME ROBUST TO MPEG AUDIO COMPRESSION

Digital Video Processing

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Interframe coding A video scene captured as a sequence of frames can be efficiently coded by estimating and compensating for motion between frames pri

Digital Watermarking of Still Images using the Discrete Wavelet Transform

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

OVER the last few years, there has been a preponderance of

Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal.

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

BLIND EXTRACTION OF HIDDEN DATA FROM DIGITAL IMAGE USING M-IGLS ALGORITHM

A Statistical Comparison of Digital Image Watermarking Techniques

A New approach of SVD-DWT Video Watermarking Embedding Algorithm

FPGA IMPLEMENTATION OF BIT PLANE ENTROPY ENCODER FOR 3 D DWT BASED VIDEO COMPRESSION

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Perceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects.

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Fingerprint Watermark Embedding by Discrete Cosine Transform for Copyright Ownership Authentication

arxiv: v1 [cs.mm] 9 Aug 2017

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

Index. 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5.

Mrs. Vandana Assistant Professor (Dept. of Computer Science and Engg.) Hindu College of Engineering, Sonepat, Haryana, India

EE 5359 Low Complexity H.264 encoder for mobile applications. Thejaswini Purushotham Student I.D.: Date: February 18,2010

Digital Image Watermarking Using DWT and Shift Invariant Edge Detection

Transcription:

Tracing Watermarking for Multimedia Communication Quality Assessment Patrizio Campisi, member, IEEE, Marco Carli, Gaetano Giunta, member, IEEE, Alessandro Neri, member, IEEE Università degli Studi Roma Tre Dipartimento di Ingegneria Elettronica Via della Vasca Navale 84, I-46 Roma, Italy Tel: +39.6.55.64, Fax: +39.6.5598 Abstract- Multimedia data hiding by digital watermarking is usually employed for copyright protection purposes. In this contribution, a new application of watermarking is presented. Specifically, watermarking is here employed as a technique for testing the quality of service in multimedia mobile communications. A fragile known watermark is embedded in a MPEG-like host data video transport stream using a spreadspectrum technique to avoid visual interference. Like a tracing signal, a (known) tracing watermark tracks the (unknown) information stream that follows the same communication link. The detection of the tracing watermark allows dynamically evaluating the effective quality of the provided video services, depending on the whole physical layer (including the employed image co/decoder). The performed method is based on the mean-square-error between estimated and actual watermarks. The devised technique has been usefully applied to typical scenarios of mobile wireless multimedia communication systems, in presence of multi-path channel and interfering users. Key words- Multimedia communications, Quality of Service, UMTS services, Video streaming, Watermarking. I. INTRODUCTION In the past few years, there has been an explosion in the use and distribution of digital multimedia data, essentially driven by the diffusion of Internet. Nowadays electronic commerce applications, on-line services such as banking or booking and, more in general, services involving multimedia data, are rapidly increasing. In the near future, third generation mobile communication systems (IMT/UMTS) will be providing a large number of innovating and interlaced services. Therefore, it follows the necessity for the services providers to develop a simple and effective billing system related to the quality of the service supplied. Therefore, it is crucial to devise a quality assessment system that not increases the transmission bit-rate. In this scenario, we develop an innovative quality assessment system embedded into the same data. This aim is obtained by an unusual use of fragile watermarking, in order to estimate the quality of the transmission system. Watermarking techniques have been devised to answer the ever-growing need to protect the intellectual property (copyright) of digital still images, video sequences or audio from piracy in a networked environment like the Word Wide Web. This allows performing a controlled distribution of multimedia data. Fig.. Watermark embedding process Although copyright protection was the very first application of watermarking, different uses have been recently proposed in literature. Fingerprinting, broadcast monitoring, data authentication, multimedia indexing, content based retrieval applications, medical imaging applications [] are only a few of the new applications where watermarking can be usefully employed. The general watermark embedding procedure is sketched in Fig.. It consists in embedding a sequence, which is usually binary (the watermark), into host data by means of a key. In the detection phase, the key is used to verify the presence of the embedded sequence. With regards to the domain where the watermark embedding occurs, we can distinguish methods operating in the spatial domain [], in the DCT domain [3], [4], [5], in the Fourier Transform domain [6], and in the Wavelet Transform domain [], [8], [9], [], []. When considering a watermarking scheme, according to its specific application, different requirements need to be accomplished. One requirement that a watermarking scheme must satisfy, is the perceptual invisibility of the mark superimposed on the host data. This implies that the alterations caused by the watermark superimposition on the data should not degrade their perceptual quality. Moreover, when these techniques are used to preserve the copyright ownership and to avoid unauthorized data duplications, the embedded watermark should be detectable, even if malicious attacks or non-deliberate modifications (i.e. filtering, compression, etc.) affect the embedded watermark. This requirement is known as watermark robustness. However, when in the embedding procedure unwanted modifications of the watermarked data severely affect even the extracted watermark, the embedding scheme is known as fragile. Fragile watermarking [], [3], [4], can be used to obtain information about the tampering process: in fact, it -83-4-//$. IEEE 54

indicates whether the data has been altered, and supplies localization information as to where the data was altered. In our approach, we present an unconventional use of fragile watermark to evaluate the quality of service (QoS) in multimedia mobile communications. Specifically, a known watermark is superimposed on the host data. This implies that, by transmitting the watermarked data onto a channel, the mark undergoes the same alterations suffered by the data. At the receiving side, the watermark is estimated and compared with its original counterpart. Since the alterations endured by the watermark are likely to be suffered also by the data, as they follow the same communication link, the watermark degradations can be used to estimate the overall alterations endured by the data. The method we present is twofold. In fact, in a communication scheme where the data are first coded and then transmitted, our approach can be used to estimate both the degradations introduced by the cascade coder-channel and the ones introduced only by the channel. In the first case, the watermark embedding is performed in the data before coding, whereas in the second case the watermark embedding is performed in the coded bit stream by taking advantage of the coder characteristics. In this paper we deal with host data that are video sequences encoded by means of the MPEG- [5] compression standard. The reason for this choice relies on the fact that, such as in a digital television-broadcasting scenario, MPEG- compressed videos are transmitted over telecommunication wireless systems. The paper is organized as follows. In Section II a brief description of the MPEG- video compression standard is provided. The quality assessment procedure principle is summarized in Section III, and in Section IV it is described in detail. Some experimental results are provided in Section V. The conclusions are finally drawn in Section VI. II. THE MPEG VIDEO STANDARD The purpose of this Section is to give a very brief overview of the MPEG- video coding scheme (a detailed description can be found in [5]). The MPEG- video bit stream has a layered syntax. In a top-bottom hierarchical structure the video sequence is subdivided into multiple Group of Pictures (GOPs), representing sets of video frames which are contiguous in display order. The next layer is a constituted by a single frame that is composed by one or more slices. Then, the slice contains one or more macro blocks, consisting of four luminance (Y) and two chrominance (U,V) blocks. Finally the block is the basic coding unit of dimension 8 by 8 pixels. In order to obtain a high compression ratio, both spatial and temporal redundancies are exploited. In particular, the spatial redundancy is reduced by using sub sampling of the chrominance components (U, V) in accordance with the sensitivity of the human visual system, then the Discrete Cosine Transform (DCT) is performed on the blocks of the Y and U, V components. Then the DCT coefficients are quantized and finally encoded by using variable length Fig.. Principle scheme of tracing watermarking for coderchannel quality assessment in multimedia communications. coding. The temporal redundancy is reduced by temporally predicting some frames from other motion compensated frames. The prediction error is then encoded. Three types of frames are used in the MPEG standard: (I) Intra-frames, which are coded with any reference to other frames, (P) Predicted frames, which are coded with reference to previous I or P-frames, and (B) Bi-directionally interpolated frames, which are coded with reference to both previous and next frames. An encoded GOP always starts with an I-frame, to allow random access of the video stream. III. TRACING WATERMARKING PROCEDURE A principle scheme of the tracing watermarking for coder-channel quality assessment is reported in Fig.. The watermarking embedding is performed by resorting to spread-spectrum technique [4], [6]. Roughly speaking, the watermark (narrow band low energy signal) is spread over the image (larger bandwidth signal) so that the watermark energy contribution for each host frequency bins is negligible, which makes the watermark imperceptible. More in detail, a set of uncorrelated pseudo-random noise (PN) matrices (one per each frame and known to the receiver) is multiplied by the reference watermark (one for all the transmission session and known to the receiver). The use of different spreading PN matrices assures that the spatial localization of the mark is different frame by frame, so that the watermark visual persistency is negligible. After generating the marks, the embedding of the tracing mark is performed in the Discrete Cosine Transform (DCT) Domain [5], [6]. The two-dimensional watermark is embedded in the DCT middle-band frequencies of the whole image. The watermark is then randomised by the PN matrices and added to the DCT of each frame. The inverse DCT transform is 55

performed, and the whole sequence is MPEG- coded and finally transmitted. The receiver implements video decoding. Then, a matched filter extracts the spread watermark from the DCT of each received frame of the sequence. After having dispread it using the known PN matrix, the estimated watermark is matched to the reference one. In particular, its mean-squareerror () is evaluated as an index of the effective degradation of the provided QoS. As outlined in the Introduction, we deal with MPEG- compressed sequences. It is worth noting that we choose to embed the watermark in the I frames, thus avoiding to embed it in the P and B frames. In fact, the I frames do not suffer from any interpolation error with respect to the P and B frames. In this fashion the watermark is affected only by the channel s errors and, at the receiver side, the estimation of the degradations affecting the received mark can be used to provide quality assessment of the channel. IV. THE QOS ASSESSMENT PROCEDURE USING TRACING WATERMARKING The watermarking procedure used in our method is based on embedding the mark j > > in the DCT middle-band frequencies of each video sequence frame W z z by resorting to the spread-spectrum techniques described in [4], [6]. Specifically, the watermark j > > is first spread by using a set of uncorrelated pseudo-random noise matrices > > thus obtaining: wxd j > > j > > > = >. () It is worth noting that both the PN matrices and the watermark are known at the receiving side. Moreover the watermark embedded is the same for each video sequence frame whereas the PN matrices are different for each frame. This assures that the spatial localization of the mark is different frame by frame, thus avoiding visual summation. Then, the watermark is embedded in the mid-frequency of the DCT domain according to the following rule < A D () B wjd > > ;gx W z z j w XD > = + > where α is a scaling factor that determines the watermark strength. The final marked frame is obtained performing the inverse DCT as i ( w) i ( w) f n, n = IDCT> F k, k C. (3) This procedure, here described for the i-th frame, is repeated for each frame. Finally, MPEG- coding is performed and transmission over a noisy channel simulated by a Poisson s generator of random transmission errors occurs. At the receiving side, an estimation of the spread version w D of the watermark embedded in the i-th frame, j > X >, is evaluated as follows: j > > = B > > j> > (4) w X D w j D > H > H > H having indicated with w jd B > > > H the received DCT of the marked i-th frame. Then, the watermark is estimated by averaging the dispread watermarks, obtained by multiplying j > > by the corresponding PN matrix > >, over the M frames: - w D > H > H > H - j X = > > > > j> >. (5) = The extracted watermark is compared with the original one thus providing a QoS assessment for the transmitted video since we assume that the sequence and the embedded watermark suffer the same quality degradation through the coding/transmission procedure. The metric employed for quality assessment is the meansquare-error () between the estimated watermark and the original one. Specifically the is first evaluated for the i- th frame as follows: K K i = wi k k wi k k KK [, ] [, ] k = k = 4 9 (6) Then, it is averaged over the M frames under analysis, thus obtaining M = M i= i, () which represents the employed metric. V. EXPERIMENTAL RESULTS In this Section some experimental results characterizing the performances of the proposed method are provided. Specifically, simulations have been performed by introducing two different video quality degradation sources: a noisy channel, and the co-decoder. In particular, this latter can induce variations on the video quality by changing:. the quantization matrix;. the bit-rate; 3. the number of intra-coded frames. To evaluate the sensibility of the method to the degradations due only to the coder, tests have been performed with ideal channel and different coder quality. The (normalized by 5 ) of the extracted watermark, evaluated according to (), (8), and of the video sequence 56

5 WaterMark Error Energy Sequence Error Energy 4 45 4 35 3 8 MQ* MQ* MQ*4 MQ*8 MQ*6 MQ*3 5 6 5 4 5 6 6 6 3 Quantization Matrix Index ^ -4.5 ^ -4 ^ -3.5 ^ -3 ^ -.5 Bit Error Rate Fig. 3. Watermark (normalized by 5 ) versus several quantization matrix indices. 8 6 5 4 3 perfect quality high quality medium quality low quality ^-4.5 ^ -4 ^ -3,5 ^ -3 ^ -,5 Bit Error Rate Fig. 5. Watermark (normalized by 5 ) versus the bit error rate and parameterized with respect to different number of intra frame. Fig. 4. Watermark (normalized by 5 ) versus the bit error rate and parameterized with respect to different quantization matrix indices. versus different quantization matrices is depicted in Fig. 3, where higher matrix indices correspond to coarser quantization matrices. Specifically, the original quantization matrix has been multiplied by the matrix indices,, 4, 8, 6, and 3. From the results shown in Fig. 3, we can then validate the initial hypothesis that the watermark degradations have the same behavior of the degradations suffered by the video sequence. In Fig. 4, the watermark versus the bit error rate, for several quantization matrices, is reported. The original quantization matrix MQ is considered and it is multiplied by,, 4, 8, 6, 3 thus obtaining coarser quantization matrices. The experimental results highlight that coarser quantization matrices give higher watermark values. This is in accordance with the visual degradation suffered by the coded video sequence when coarser quantization matrices are used. In Fig. 5, the watermark versus the bit error rate, for increasing number of intra-coded frames is reported. The perfect quality situation refers to videos with no predicted frames (B and P), while a different intra-frame rate has been implemented in the other cases. VI. CONCLUDING REMARKS We have proposed an unconventional method of tracing watermarking as a hidden technique suited for testing the quality of service in multimedia mobile communications. In our approach, a fragile (known) watermark is hidden into MPEG- host data video transport stream. Spread-spectrum 5

pseudo-noise matrices, characterized by random keys, are also used to avoid visual persistency. Experimentations show that the error affecting the watermark is sensitive to the employed quantization matrix, to the bit rate, and to the intra-coded frame number. Therefore our approach allows blindly estimating the quality of a coding/transmission system without affecting the quality of the video-communication. The performed QoS assessment procedure can be usefully employed for different purposes in wireless multimedia communication networks such as:. control feedback to the sending user on the effective quality of the link;. detailed information to the operator for billing purposes; 3. diagnostic information to the operator on the effective status of the link. REFERENCES [] Hanjalic, G. C. Langelaar, P.M.B. van Roosmalen, J. Biemond, R.L. Lagendijk, Image and video databases: restoration, watermarking and retrieval, Elsevier. [] N. Nikolaidis, and I. Pitas, Robust image watermarking in the spatial domain, Signal Processing, vol. 66, no.3, pp. 385-43, May 998. [3] M. Barni, F. Bartolini, V. Cappellini, A. Piva, A DCTdomain system for robust image watermarking, Signal Processing, vol. 66, no. 3, pp. 35-3, May 998. [4] I. Cox, J. Kilian, F. Leighton, T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia, in IEEE Trans. Image Processing, vol. 6, no., December 99. [5] M. D. Swanson, B. Zhu, A. H. Tewfik, Transparent robust image watermarking, transform, Proc. IEEE Int. Conf. on Image Processing 996, Lousanne, Switzerland, pp. -4, 6-9 September, 996. [6] R.M. Wolfgang, and E.J. Delp, A watermark for digital images, Proc. IEEE Int. Conf. on Image Processing 996, Lousanne, Switzerland, pp. 9-, 6-9 September 996. [] R. Dugad, K. Ratakonda and N. Ahuja, A new wavelet-based scheme for watermarking images, Proc. IEEE Int. Conf. on Image Processing 998, Chicago, IL, pp. 49-43, 4- October 998. [8] D. Kundur, D. Hatzinakos, Digital watermarking using multiresolution wavelet decomposition, Proc. IEEE Int. Conf. On Acoustic, Speech and Signal Processing, pp. 969-9, vol.5, 998. [9] H. Inoue, A.Miyazaki, T. Katsura, An image watermarking method based on the wavelet transform, Proc. IEEE Int. Conf. on Image Processing 999, pp. 96-3, Kobe, Japan, 5-8 October, 999. [] H. J. M. Wang, P. C. Su, and C. C. J. Kuo, Waveletbased blind watermark retrieval technique, Proc. SPIE, vol 358, Conf. On Multimedia Systems and Applications, Boston, MA, November 998. [] P. Campisi, A. Neri, M. Visconti, A Wavelet Based Method for High Frequency Subbands Watermark Embedding, SPIE Multimedia Systems and Applications III, Boston (MA), November. [] M. M. Yeung, F. Mintzer, An invisible watermarking technique for image verification, Proc. IEEE Int. Conf. on Image Processing 99, Santa Barbara (CA), pp. 68-683, 99. [3] D. Kundur, D. Hatzinakos, Towards a telltale watermarking technique for tamper-proofing, Proc. IEEE Int. Conf. on Image Processing 998, Chicago (IL), pp. 49-43, 4- October, 998. [4] R.H. Wolfgang, E.J. Delp, Fragile Watermarking using the VWD Watermark, SPIE, Security and Watermarking of Multimedia Contents, vol. 365, San Jose, CA, USA, January 999. [5] ISO, Information Technology Coding of moving pictures and associated audio for digital storage media at up to about,5 Mbit/s Part : Video, ISO/IEC -, 993. [6] H. Hartung, J. K. Su, B. Girod, Spread spectrum watermarking: malicious attacks and counterattacks Proc. SPIE, Security and Watermarking of Multimedia Contents, vol. 365, San Jose, CA, USA, January 999. 58