Skip to main content

Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2776))

Abstract

Methods of attack on watermarks embedded with quantization index modulation and block DCT are introduced in this paper. The proposed method can detect the presence of hidden data by analyzing the histogram or spectrum of the transform coefficients, and prevent their extraction without further degrading the image. It is shown that, in some cases, the embedding-induced distortion can even be reduced in terms of peak-signal-to-noise ratio. Experimental results are given to show the effectiveness of the method.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, B., Wornell, G.: Quantization Index Modulation: a Class of Provably Good Method for Watermarking and Information Embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  2. Chen, B., Wornell, G.: Dither modulation: A New Approach to Digital Watermarking and Information Embedding. In: Proceedings of the SPIE, vol. 3657, pp. 342–353 (1999)

    Google Scholar 

  3. Eggers, J.J., Girod, B.: Quantization Effect on Digital Watermarks, Signal Processing 81, 239–263 (2001)

    MATH  Google Scholar 

  4. Wang, H., and Wang, S.: Cyber Warfare— Steganography vs. Steganalysis. Communication of the ACM (in press)

    Google Scholar 

  5. Wang, S., Zhang, X., Ma, T.: Image Watermarking Using Dither Modulation in Dual- Transform Domain. Journal of the Imaging Society of Japan 41(4), 398–402 (2002)

    Google Scholar 

  6. Pratt, W.K.: Digital Image Processing, New York. Wiley, Chichester (1978)

    Google Scholar 

  7. Reininger, R., Gibson, J.: Distributions of the Two-Dimensional DCT Coefficients for Images. IEEE Trans. Commun., COM-31, 835–839 (June 1983)

    Google Scholar 

  8. Muller, F.: Distribution Shape of Two-Dimensional DCT Coefficients of Natural Images. Electronics Letters 29, 1935–1936 (1993)

    Article  Google Scholar 

  9. Petitcolas, F.A.P., et al.: Evaluation of Copyright Marking Systems. In: Proceeding of IEEE Multimedia Systems 1999, Florence, Italy, June 7-11, vol. 1, pp. 574–579 (1999)

    Google Scholar 

  10. Fisk, G., et al.: Eliminating Steganography in Internet Traffic with Active Wardens. In: 5th International Workshop on Information Hiding (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, K., Wang, S., Zhang, X. (2003). Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2003. Lecture Notes in Computer Science, vol 2776. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45215-7_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45215-7_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40797-3

  • Online ISBN: 978-3-540-45215-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics