Abstract
Here we study a recently proposed watermarking scheme based on the paper “Wavelet Tree Quantization” (WTQ) by Wang and Lin (IEEE Trans Image Process 13(2):154–165, 2004). In given scheme, wavelet coefficients corresponding to the same spatial locations are grouped together. Two such groups, selected at random, constitute a supertree. Some of these supertrees are quantized to embed the watermark information in the image. In the process of cryptanalysis we first identify the groups which are quantized during the watermark insertion process. Then we select the non-quantized groups and quantize them too, to remove the watermark. Experimental results show that the watermark is completely removed by this attack. The cryptanalysis falls under the cipher text only jamming attack which requires only a single watermarked copy. Further, we suitably modify the WTQ scheme to make it robust against such cryptanalytic attacks.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Anderson R.J., Petitcolas F.A.P. (1998): On the limits of steganography. IEEE J. Sel. Areas Commun. (Special issue on copyright and privacy protection) 16(4): 474–481
Boeuf, J., Stern, J.P.: An analysis of one of the SDMI candidates. In: Information Hiding 2001. Lecture Notes in Computer Science. vol. 2137, pp. 395–410 Springer, Berlin Heidelberg New York (2001)
Cayre, F., Fontaine, C., Furon, T.: Watermarking security part I: theory. In: The Proceedings of International Conference on Security, Steganography and Watermarking of Multimedia Contents VI SPIE-IS & T Electronic Imaging, SPIE, vol. 5681, pp. 746–757, 2005
Das T.K., Maitra S., Mitra J. (2005): Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme. IEEE Trans. Signal Process. 53(2): 768–775
Das T.K., Maitra S. (2004): Cryptanalysis of correlation based watermarking schemes using single watermarked copy. IEEE Signal Process. Lett. 11(4): 446–449
Ergun, F., Kilian J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Eurocrypt 1999. LNCS, vol. 1592, pp. 140–149, Springer, Berlin Heidelberg New york (1999)
Fridrich, J.: Key-dependent random image transforms and their applications in image watermarking. In: Proceedings of the International Conference on Imaging Science, Systems, and Technology, CISST’99, Las Vegas, NV, pp. 237–243, USA, June 1999
Fridrich, J., Baldoza, A.C., Simard, R.J.: Robust digital watermarking based on key-dependent basis functions. In: Information Hiding: Second International Workshop. Portland, OR, USA, April 1998. Lecture Notes in Computer Science, vol. 1525, pp. 143–157, Springer, Berlin Heidelberg New York (1998)
Johnson N.F., Duric Z., Jajodia S. (2000): Information Hiding: Steganography and Watermarking—Attacks and Countermeasures. Kluwer, Boston
Johnson, N.F., Duric, Z., Jajodia, S.: Recovery of watermarks from distorted images. In: Proceedings of the Third Information Hiding Workshop, LNCS, vol. 1768, pp. 318–332. Springer, Berlin Heidelberg New York (2000)
Kalker, T., Linnartz, J.P.M.G., Dijk, M.v.: Watermark estimation through detector analysis. In: International Conference on Image Processing, 1998
Katzenbeisser, S., Petitcolas, F.A.P., (eds): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, USA (2000)
Kerckhoffs, A.: La Cryptographie Militaire. J. Sci. Mil. 9th series, IX, 5–38, Jan 1883, 161–191, FEB 1883
Kirovski, D., Malvar, H.S.: Embedding and detecting spread-spectrum watermarks under the estimation attack. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2002
Kirovski, D., Petitcolas, F.A.P.: Replacement attack on arbitrary watermarking systems. In: ACM Workshop on Digital Rights Management 2002. Lecture Notes in Computer Science, vol. 2696, pp. 177–189. Springer, Berlin Heidelberg New York (2002)
Kundur, D.: Improved digital watermarking through diversity and attack characterization. In: Proceedings of the ACM Workshop on Multimedia Security’99, Orlando, FL, USA, October 1999, pp. 53–58
Langelaar G.C., Lagendijk R.L. (2001): Optimal differential energy watermarking of DCT encoded images and video. IEEE Trans. Image Process. 10(1): 148–158
Mallat S.G. (1989): A theory of multi resolution signal decomposition: the Wavelet representation. IEEE Trans PAMI 11, 674–693
ihcak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of discrete-sequence spread spectrum watermarks. In: Workshop on Information Hiding 2002, Lecture Notes in Computer Science, vol 2578, pp. 226–246. Springer, Berlin Heidelbreg New York (2003)
Meerwald, P., Uhl, A.: Watermark Security via Wavelet Filter Parameterization. In: The Proceedings of ICIP, 2001, vol. 3, pp. 1027–1030, 2001
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G., Aucsmith, D.: Attacks on copyright marking systems. In: 2nd Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1525 pp. 28–238. Springer, Berlin Heidelberg New York (1998)
Petitcolas, F.A.P., Anderson, R.J.: Evaluation of copyright marking systems. In: IEEE Multimedia Systems, Florence, Italy, June 1999
Ruanaidh J.O., Petersen H., Herrigel A., Pereira S., Pun T. (1999): Cryptographic copyright protection for digital images based on watermarking techniques. Theor. Comput. Sci. 226, 117–142
Wang Y., Doherty J.F., VanDyck R.E. (2002): A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process. 11(2): 77–88
Wang, H.-J., Kuo, C.-C.J.: Watermark design for embedded wavelet image codec. In: Proceedings of the SPIE’s 43rd Annual Meeting, Applications of Digital Image Processing, San Diego, CA, USA, July 1998, vol. 3460, pp. 388–1398
Wang S.-H., Lin Y.-P. (2004): Wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process. 13(2): 154–165
Author information
Authors and Affiliations
Corresponding author
Additional information
This is an extended and revised version of the paper Cryptanalysis of “Wavelet Tree Quantization” Watermarking Scheme presented at the International Workshop on Distributed Computing, IWDC 2004, Kolkata, 27–30 December 2004, Lecture Notes in Computer Science, vol. 3326, pp. 219–230. Springer, Berlin Heidelberg New York (2004). Section 4 of this paper introduces a modified scheme which is an addition over the conference version. Part of this work has been done while the author T. K. Das was visiting Indian Statistical Institute, Kolkata during 2004.
Rights and permissions
About this article
Cite this article
Das, T.K., Maitra, S. Analysis of the “Wavelet Tree Quantization” watermarking strategy and a modified robust scheme. Multimedia Systems 12, 151–163 (2006). https://doi.org/10.1007/s00530-006-0046-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-006-0046-9