Abstract
Methods of attack on watermarks embedded with quantization index modulation and block DCT are introduced in this paper. The proposed method can detect the presence of hidden data by analyzing the histogram or spectrum of the transform coefficients, and prevent their extraction without further degrading the image. It is shown that, in some cases, the embedding-induced distortion can even be reduced in terms of peak-signal-to-noise ratio. Experimental results are given to show the effectiveness of the method.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Chen, B., Wornell, G.: Quantization Index Modulation: a Class of Provably Good Method for Watermarking and Information Embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)
Chen, B., Wornell, G.: Dither modulation: A New Approach to Digital Watermarking and Information Embedding. In: Proceedings of the SPIE, vol. 3657, pp. 342–353 (1999)
Eggers, J.J., Girod, B.: Quantization Effect on Digital Watermarks, Signal Processing 81, 239–263 (2001)
Wang, H., and Wang, S.: Cyber Warfare— Steganography vs. Steganalysis. Communication of the ACM (in press)
Wang, S., Zhang, X., Ma, T.: Image Watermarking Using Dither Modulation in Dual- Transform Domain. Journal of the Imaging Society of Japan 41(4), 398–402 (2002)
Pratt, W.K.: Digital Image Processing, New York. Wiley, Chichester (1978)
Reininger, R., Gibson, J.: Distributions of the Two-Dimensional DCT Coefficients for Images. IEEE Trans. Commun., COM-31, 835–839 (June 1983)
Muller, F.: Distribution Shape of Two-Dimensional DCT Coefficients of Natural Images. Electronics Letters 29, 1935–1936 (1993)
Petitcolas, F.A.P., et al.: Evaluation of Copyright Marking Systems. In: Proceeding of IEEE Multimedia Systems 1999, Florence, Italy, June 7-11, vol. 1, pp. 574–579 (1999)
Fisk, G., et al.: Eliminating Steganography in Internet Traffic with Active Wardens. In: 5th International Workshop on Information Hiding (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, K., Wang, S., Zhang, X. (2003). Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2003. Lecture Notes in Computer Science, vol 2776. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45215-7_31
Download citation
DOI: https://doi.org/10.1007/978-3-540-45215-7_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40797-3
Online ISBN: 978-3-540-45215-7
eBook Packages: Springer Book Archive