Information-theoretic analysis of watermarking

Pierre Moulin, Joseph A. O'Sullivan

Research output: Chapter in Book/Report/Conference proceedingConference contribution


An information-theoretic analysis of watermarking is presented in this paper. We formulate watermarking as a communication problem with side information at the encoder and decoder and determine the hiding capacity, which upper-bounds the rates of reliable transmission and quantifies the fundamental tradeoff between three quantities: the achievable watermarking rates and the allowed distortion levels for the information hider and the attacker. The hiding capacity is the value of a game between the information hider and the attacker. The optimal attack strategy is the solution of a particular rate-distortion problem, and the optimal hiding strategy is the solution to a channel coding problem. For several important problems, the hiding capacity is the same whether or not the decoder knows the host data set. It is also shown that existing watermarking systems in the literature operate far below capacity.

Original languageEnglish (US)
Title of host publicationDesign and Implementation of Signal Processing SystemNeural Networks for Signal Processing Signal Processing EducationOther Emerging Applications of Signal ProcessingSpecial Sessions
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages4
ISBN (Electronic)0780362934
StatePublished - Jan 1 2000
Event25th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2000 - Istanbul, Turkey
Duration: Jun 5 2000Jun 9 2000

Publication series

NameICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
ISSN (Print)1520-6149


Other25th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2000

ASJC Scopus subject areas

  • Software
  • Signal Processing
  • Electrical and Electronic Engineering


Dive into the research topics of 'Information-theoretic analysis of watermarking'. Together they form a unique fingerprint.

Cite this