Abstract
The embedding of additive noise sequences is often used to hide information in digital audio, image or video documents. However, the embedded information might be impaired by involuntary or malicious “attacks.” This paper shows that quantization attacks cannot be described appropriately by an additive white Gaussian noise (AWGN) channel. The robustness of additive watermarks against quantization depends strongly on the distribution of the host signal. Common compression schemes decompose a signal into sub-signals (e.g., frequency coefficients) and then adapt the quantization to the characteristics of the sub-signals. This has to be considered during watermark detection. A maximum likelihood (ML) detector that can be adapted to watermark sub-signals with different robustness is developed. The performance of this detector is investigated for the case of image watermark detection after JPEG compression.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Eggers, J.J., Girod, B.: Quantization Effects on Digital Watermarks. Signal Processing (1999) (submitted)
Glover, I.A., Grant, P.M.: Digital Communications. Prentice Hall, London (1998)
Gray, R.M., Stockham, T.G.: Dithered quantizers. IEEE Transactions on Information Theory 39(3), 805–812 (1993)
Hancock, J.C., Wintz, P.A.: Signal Detection Theory. McGraw-Hill, Inc., New York (1966)
Hartung, F., Su, J.K., Girod, B.: Spread spectrum watermarking: Malicious attacks and counter-attacks. In: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, San Jose, Ca, USA, January 1999, vol. 3657 (1999)
Jayant, N.S., Noll, P.: Digital Coding of Waveforms. Prentice-Hall, Englewood Cliffs (1984)
Kundur, D., Hatzinakos, D.: Digital watermarking using multiresolution wavelet decomposition. In: Proceedings IEEE International Conference on Acoustics, Speech, and Signal Processing 1998 (ICASSP 1998), Seattle, WA, USA, May 1998, vol. 5, pp. 2969–2972 (1998)
Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Proceedings of SPIE Vol. 3657: Security and Watermarking of Multimedia Contents, San Jose, Ca, USA (January 1999)
Papoulis, A.: Probability, Random Variables, and Stochastic Processes, 3rd edn. McGraw-Hill, New York (1991)
Schuchman, L.: Dither signals and their effect on quantization noise. IEEE Transaction on Communication Technology (COM) 12, 162–165 (1964)
Su, J.K., Girod, B.: On the imperceptibiliy and robustness of digital fingerprints. In: Proceedings IEEE International Conference on Multimedia Computing and Systems (ICMCS 1999), Florence, Italy (June 1999)
Su, J.K., Girod, B.: Power-spectrum condition for L2-efficient watermarking. In: Proceedings of the IEEE International Conference on Image Processing 1999 (ICIP 1999), Kobe, Japan (October 1999) (accepted)
Su, J.K., Hartung, F., Girod, B.: A channel model for a watermark attack. In: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, San Jose, Ca, USA, January 1999, vol. 3657 (1999)
Wallace, G.K.: The JPEG still picture compression standard. Communications of the ACM 34(4), 31–44 (1991)
Xie, L., Arce, G.R.: A Blind Wavelet Based Digital Signature for Image Authentication. In: Proceedings European Signal Processing Conference (EUSIPCO 1998), Greece (September 1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Eggers, J.J., Girod, B. (2000). Watermark Detection after Quantization Attacks. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_13
Download citation
DOI: https://doi.org/10.1007/10719724_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67182-4
Online ISBN: 978-3-540-46514-0
eBook Packages: Springer Book Archive