Skip to main content
Log in

Analysis of the “Wavelet Tree Quantization” watermarking strategy and a modified robust scheme

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Here we study a recently proposed watermarking scheme based on the paper “Wavelet Tree Quantization” (WTQ) by Wang and Lin (IEEE Trans Image Process 13(2):154–165, 2004). In given scheme, wavelet coefficients corresponding to the same spatial locations are grouped together. Two such groups, selected at random, constitute a supertree. Some of these supertrees are quantized to embed the watermark information in the image. In the process of cryptanalysis we first identify the groups which are quantized during the watermark insertion process. Then we select the non-quantized groups and quantize them too, to remove the watermark. Experimental results show that the watermark is completely removed by this attack. The cryptanalysis falls under the cipher text only jamming attack which requires only a single watermarked copy. Further, we suitably modify the WTQ scheme to make it robust against such cryptanalytic attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Anderson R.J., Petitcolas F.A.P. (1998): On the limits of steganography. IEEE J. Sel. Areas Commun. (Special issue on copyright and privacy protection) 16(4): 474–481

    Article  Google Scholar 

  2. Boeuf, J., Stern, J.P.: An analysis of one of the SDMI candidates. In: Information Hiding 2001. Lecture Notes in Computer Science. vol. 2137, pp. 395–410 Springer, Berlin Heidelberg New York (2001)

  3. Cayre, F., Fontaine, C., Furon, T.: Watermarking security part I: theory. In: The Proceedings of International Conference on Security, Steganography and Watermarking of Multimedia Contents VI SPIE-IS & T Electronic Imaging, SPIE, vol. 5681, pp. 746–757, 2005

  4. Das T.K., Maitra S., Mitra J. (2005): Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme. IEEE Trans. Signal Process. 53(2): 768–775

    Article  MathSciNet  Google Scholar 

  5. Das T.K., Maitra S. (2004): Cryptanalysis of correlation based watermarking schemes using single watermarked copy. IEEE Signal Process. Lett. 11(4): 446–449

    Article  Google Scholar 

  6. Ergun, F., Kilian J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Eurocrypt 1999. LNCS, vol. 1592, pp. 140–149, Springer, Berlin Heidelberg New york (1999)

  7. Fridrich, J.: Key-dependent random image transforms and their applications in image watermarking. In: Proceedings of the International Conference on Imaging Science, Systems, and Technology, CISST’99, Las Vegas, NV, pp. 237–243, USA, June 1999

  8. Fridrich, J., Baldoza, A.C., Simard, R.J.: Robust digital watermarking based on key-dependent basis functions. In: Information Hiding: Second International Workshop. Portland, OR, USA, April 1998. Lecture Notes in Computer Science, vol. 1525, pp. 143–157, Springer, Berlin Heidelberg New York (1998)

  9. Johnson N.F., Duric Z., Jajodia S. (2000): Information Hiding: Steganography and Watermarking—Attacks and Countermeasures. Kluwer, Boston

    Google Scholar 

  10. Johnson, N.F., Duric, Z., Jajodia, S.: Recovery of watermarks from distorted images. In: Proceedings of the Third Information Hiding Workshop, LNCS, vol. 1768, pp. 318–332. Springer, Berlin Heidelberg New York (2000)

  11. Kalker, T., Linnartz, J.P.M.G., Dijk, M.v.: Watermark estimation through detector analysis. In: International Conference on Image Processing, 1998

  12. Katzenbeisser, S., Petitcolas, F.A.P., (eds): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, USA (2000)

  13. Kerckhoffs, A.: La Cryptographie Militaire. J. Sci. Mil. 9th series, IX, 5–38, Jan 1883, 161–191, FEB 1883

  14. Kirovski, D., Malvar, H.S.: Embedding and detecting spread-spectrum watermarks under the estimation attack. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2002

  15. Kirovski, D., Petitcolas, F.A.P.: Replacement attack on arbitrary watermarking systems. In: ACM Workshop on Digital Rights Management 2002. Lecture Notes in Computer Science, vol. 2696, pp. 177–189. Springer, Berlin Heidelberg New York (2002)

  16. Kundur, D.: Improved digital watermarking through diversity and attack characterization. In: Proceedings of the ACM Workshop on Multimedia Security’99, Orlando, FL, USA, October 1999, pp. 53–58

  17. Langelaar G.C., Lagendijk R.L. (2001): Optimal differential energy watermarking of DCT encoded images and video. IEEE Trans. Image Process. 10(1): 148–158

    Article  MATH  Google Scholar 

  18. Mallat S.G. (1989): A theory of multi resolution signal decomposition: the Wavelet representation. IEEE Trans PAMI 11, 674–693

    MATH  Google Scholar 

  19. ihcak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of discrete-sequence spread spectrum watermarks. In: Workshop on Information Hiding 2002, Lecture Notes in Computer Science, vol 2578, pp. 226–246. Springer, Berlin Heidelbreg New York (2003)

  20. Meerwald, P., Uhl, A.: Watermark Security via Wavelet Filter Parameterization. In: The Proceedings of ICIP, 2001, vol. 3, pp. 1027–1030, 2001

  21. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G., Aucsmith, D.: Attacks on copyright marking systems. In: 2nd Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1525 pp. 28–238. Springer, Berlin Heidelberg New York (1998)

  22. Petitcolas, F.A.P., Anderson, R.J.: Evaluation of copyright marking systems. In: IEEE Multimedia Systems, Florence, Italy, June 1999

  23. Ruanaidh J.O., Petersen H., Herrigel A., Pereira S., Pun T. (1999): Cryptographic copyright protection for digital images based on watermarking techniques. Theor. Comput. Sci. 226, 117–142

    Article  MATH  Google Scholar 

  24. Wang Y., Doherty J.F., VanDyck R.E. (2002): A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process. 11(2): 77–88

    Article  Google Scholar 

  25. Wang, H.-J., Kuo, C.-C.J.: Watermark design for embedded wavelet image codec. In: Proceedings of the SPIE’s 43rd Annual Meeting, Applications of Digital Image Processing, San Diego, CA, USA, July 1998, vol. 3460, pp. 388–1398

  26. Wang S.-H., Lin Y.-P. (2004): Wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process. 13(2): 154–165

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tanmoy Kanti Das.

Additional information

This is an extended and revised version of the paper Cryptanalysis of “Wavelet Tree Quantization” Watermarking Scheme presented at the International Workshop on Distributed Computing, IWDC 2004, Kolkata, 27–30 December 2004, Lecture Notes in Computer Science, vol. 3326, pp. 219–230. Springer, Berlin Heidelberg New York (2004). Section 4 of this paper introduces a modified scheme which is an addition over the conference version. Part of this work has been done while the author T. K. Das was visiting Indian Statistical Institute, Kolkata during 2004.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Das, T.K., Maitra, S. Analysis of the “Wavelet Tree Quantization” watermarking strategy and a modified robust scheme. Multimedia Systems 12, 151–163 (2006). https://doi.org/10.1007/s00530-006-0046-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-006-0046-9

Keywords

Navigation