Skip to main content
Log in

Multi-party watermark embedding with frequency-hopping sequences

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

Embedding multiple watermarks into a digital object enables multiple purposes to be realized. In this paper, we present a multi-party watermark embedding framework based on frequency-hopping sequences (FHSs). In the proposed work, a certain number of FHSs are generated in advance and then randomly assigned to multiple users. Each user uses an assigned FHS to embed his own watermark data into the cover object by slightly modifying the content. In this way, the resulting marked object containing multiple watermarks can be put into use. During the phase of watermark verification, each user can extract his own watermark from the marked object with the corresponding FHS without interacting with other users. Since the used FHSs can result in a very low number of element collisions, the probability of altering the same content within the digital object would be low, meaning that, the error rate of data extraction for each user will be low. Moreover, if the digital object was modified, the embedded information can be still retrieved as the FHSs provide high randomness. Experimental results have shown that, our work enables the multiple users to reliably extract their own watermark information for verification even the marked object was maliciously attacked, which verifies the superiority.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Petitcolas, F. A. P., Anderson, R. J., Kuhn, M. G.: Information hiding - a survey. Proc. IEEE 87, 1062–1078 (1999)

    Article  Google Scholar 

  2. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography, 2nd edn. Morgan Kaufmann (2007)

  3. Eppstein, D., Goodrich, M. T., Lam, J., Mamano, N., Mitzenmacher, M., Torr, M.: Models and algorithms for graph watermarking. Int. Conf. Inf. Secu., 283–301 (2016)

  4. Sheppard, N. P., Safavi-Naini, R., Ogunbona, P.: On multiple watermarking. Proc. ACM Workshop on Multimedia and Security: New Challenges, pp. 3–6 (2001)

  5. Mintzer, F., Braudaway, G. W.: If one watermark is good, are more better? Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Process., pp. 2067–2069 (1999)

  6. Wu, H., Wang, H., Shi, Y.: PPE-Based reversible data hiding. Proc. ACM Workshop Inf. Hiding Multimed. Security, pp. 187–188 (2016)

  7. Wu, H., Wang, H., Shi, Y.: Dynamic content selection-and-prediction framework applied to reversible data hiding. Proc. IEEE Workshop Inf. Forensics Security, pp. 1–6 (2016)

  8. Wu, H., Shi, Y., Wang, H., Zhou, L.: Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification. IEEE Trans. Circ. Syst. Video Technol. 27, 1620–1631 (2017)

    Article  Google Scholar 

  9. Li, X., Sun, J., Yang, X., Liu, W.: Multiple watermarking algorithm based on spread transform dither modulation. arXiv:1601.04522 (2016)

  10. Stankovic, S., Djurovic, I., Pitas, I.: Watermarking in the space/spatial-frequency domain using two-dimensional Radon-Wigner distribution. IEEE Trans. Image Process. 10, 650–658 (2001)

    Article  Google Scholar 

  11. Peng, D., Wang, J., Yang, S., Wang, S., Liu, A.: CDMA Based multiple-user digital watermarking. Proc. Int. Conf. Intell. Inf. Hiding Multimed. Signal Process., 75–78 (2006)

  12. Xiao, J., Wang, Y.: Multiple watermarking with side information. Proc. Int. Workshop Digital Watermarking, pp. 379–387 (2008)

  13. Scealy, R., Safavi-Naini, R., Sheppard, N. P.: Performance measurement of watermark embedding patterns. Proc. Int. Workshop Digital Watermarking, pp. 77–85 (2003)

  14. Fan, P., Darnell, M.: Sequence Design for Communications Applications. Research Studies Press (RSP). Wiley, London (1996)

    Google Scholar 

  15. Peng, D., Fan, P.: Lower bounds on the hamming auto- and cross correlations of frequency-hopping sequences. IEEE Trans. Inf. Theory 50, 2149–2154 (2004)

    Article  MathSciNet  Google Scholar 

  16. Lempel, A., Greenberger, H.: Families of sequences with optimal hamming correlation properties. IEEE Trans. Inf. Theory 20, 90–94 (1974)

    Article  MathSciNet  Google Scholar 

  17. Niu, X., Peng, D., Liu, F., Liu, X.: Lower bounds on the maximum partial correlations of frequency hopping sequence set with low hit zone. IEICE Trans. Fund. E93-A, 2227–2231 (2010)

  18. Peng, D., Fan, P., Lee, M.: Lower bounds on the periodic hamming correlations of frequency hopping sequences with low hit zone. Sci. China F. Inf. Sci. 49, 208–218 (2006)

    Article  MathSciNet  Google Scholar 

  19. Zhou, L., Peng, D., Han, H., Liang, H., Ma, Z.: Construction of optimal low-hit-zone frequency hopping sequence sets under periodic partial hamming correlation. Adv. Math. Commun. 12, 67–79 (2018)

    Article  MathSciNet  Google Scholar 

  20. Liu, X., Zhou, L.: New bound on partial hamming correlation of low-hit-zone frequency hopping sequences and optimal constructions. IEEE Commun. Lett. 22, 878–881 (2018)

    Article  Google Scholar 

  21. Mielikainen, J.: LSB Matching revisited. IEEE Signal Process. Lett. 5, 285–287 (2006)

    Article  Google Scholar 

  22. Westfeld, A.: F5-A Steganographic algorithm. Proc. Inf. Hiding, 289–302 (2001)

Download references

Acknowledgements

This work was partly supported by the National Natural Science Foundation of China (Grant Nos. 61901096 and 61902235), the High Level Talent Research Starting Project in University of Electronic Science and Technology of China, Zhongshan Institute (Grant No. 417YKQ06), the Shanghai “Chen Guang” Project (Grant No. 19CG46), and the Project of Zhongshan Science and Technology Bureau (Grant No. 2018B1122).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Limengnan Zhou.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: Sequences and Their Applications III

Guest Editors: Chunlei Li, Tor Helleseth and Zhengchun Zhou

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, L., Wu, H. Multi-party watermark embedding with frequency-hopping sequences. Cryptogr. Commun. 14, 307–318 (2022). https://doi.org/10.1007/s12095-021-00517-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-021-00517-8

Keywords

Mathematics Subject Classification (2010)

Navigation