Skip to main content

Watermark Detection after Quantization Attacks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1768))

Abstract

The embedding of additive noise sequences is often used to hide information in digital audio, image or video documents. However, the embedded information might be impaired by involuntary or malicious “attacks.” This paper shows that quantization attacks cannot be described appropriately by an additive white Gaussian noise (AWGN) channel. The robustness of additive watermarks against quantization depends strongly on the distribution of the host signal. Common compression schemes decompose a signal into sub-signals (e.g., frequency coefficients) and then adapt the quantization to the characteristics of the sub-signals. This has to be considered during watermark detection. A maximum likelihood (ML) detector that can be adapted to watermark sub-signals with different robustness is developed. The performance of this detector is investigated for the case of image watermark detection after JPEG compression.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eggers, J.J., Girod, B.: Quantization Effects on Digital Watermarks. Signal Processing (1999) (submitted)

    Google Scholar 

  2. Glover, I.A., Grant, P.M.: Digital Communications. Prentice Hall, London (1998)

    Google Scholar 

  3. Gray, R.M., Stockham, T.G.: Dithered quantizers. IEEE Transactions on Information Theory 39(3), 805–812 (1993)

    Article  MATH  Google Scholar 

  4. Hancock, J.C., Wintz, P.A.: Signal Detection Theory. McGraw-Hill, Inc., New York (1966)

    Google Scholar 

  5. Hartung, F., Su, J.K., Girod, B.: Spread spectrum watermarking: Malicious attacks and counter-attacks. In: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, San Jose, Ca, USA, January 1999, vol. 3657 (1999)

    Google Scholar 

  6. Jayant, N.S., Noll, P.: Digital Coding of Waveforms. Prentice-Hall, Englewood Cliffs (1984)

    Google Scholar 

  7. Kundur, D., Hatzinakos, D.: Digital watermarking using multiresolution wavelet decomposition. In: Proceedings IEEE International Conference on Acoustics, Speech, and Signal Processing 1998 (ICASSP 1998), Seattle, WA, USA, May 1998, vol. 5, pp. 2969–2972 (1998)

    Google Scholar 

  8. Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Proceedings of SPIE Vol. 3657: Security and Watermarking of Multimedia Contents, San Jose, Ca, USA (January 1999)

    Google Scholar 

  9. Papoulis, A.: Probability, Random Variables, and Stochastic Processes, 3rd edn. McGraw-Hill, New York (1991)

    Google Scholar 

  10. Schuchman, L.: Dither signals and their effect on quantization noise. IEEE Transaction on Communication Technology (COM) 12, 162–165 (1964)

    Article  Google Scholar 

  11. Su, J.K., Girod, B.: On the imperceptibiliy and robustness of digital fingerprints. In: Proceedings IEEE International Conference on Multimedia Computing and Systems (ICMCS 1999), Florence, Italy (June 1999)

    Google Scholar 

  12. Su, J.K., Girod, B.: Power-spectrum condition for L2-efficient watermarking. In: Proceedings of the IEEE International Conference on Image Processing 1999 (ICIP 1999), Kobe, Japan (October 1999) (accepted)

    Google Scholar 

  13. Su, J.K., Hartung, F., Girod, B.: A channel model for a watermark attack. In: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, San Jose, Ca, USA, January 1999, vol. 3657 (1999)

    Google Scholar 

  14. Wallace, G.K.: The JPEG still picture compression standard. Communications of the ACM 34(4), 31–44 (1991)

    Article  Google Scholar 

  15. Xie, L., Arce, G.R.: A Blind Wavelet Based Digital Signature for Image Authentication. In: Proceedings European Signal Processing Conference (EUSIPCO 1998), Greece (September 1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Eggers, J.J., Girod, B. (2000). Watermark Detection after Quantization Attacks. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_13

Download citation

  • DOI: https://doi.org/10.1007/10719724_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67182-4

  • Online ISBN: 978-3-540-46514-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics