1 April 2010 Boosting robustness against composite attacks for quantization index-modulation algorithms
Author Affiliations +
Abstract
Although solutions to a particular attack against the quantization index modulation (QIM) method such as valumetric scaling have been proposed, no attempt has been made to a combined form of common attacks, including valumetric scaling, constant change, additive white Gaussian noise (AWGN), and compressions. Of course, the composite attacks are more realistic but more difficult to solve. In this work, we tackle composite attacks in the framework of the QIM. We seek the solution in DC values of image blocks. By embedding watermark bits into DC values, QIM becomes generically robust against AWGN and most image compression attacks. To undo the alterations caused by valumetric scaling and constant change, pilot reference signals can be embedded into some selected image blocks, where the parameters for the affine transform model of the attacks are estimated directly from the watermarked images. Four versions of block-wise QIM algorithms with pilot signals are proposed. Experimental results show their robustness against severe composite attacks, including valumetric scaling, constant change, AWGN, and JPEG compressions.
©(2010) Society of Photo-Optical Instrumentation Engineers (SPIE)
Chee-Sun Won "Boosting robustness against composite attacks for quantization index-modulation algorithms," Journal of Electronic Imaging 19(2), 023010 (1 April 2010). https://doi.org/10.1117/1.3427158
Published: 1 April 2010
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Quantization

Composites

Modulation

Image compression

Distortion

Affine motion model

RELATED CONTENT

Source and channel coding approach to data hiding
Proceedings of SPIE (May 30 2000)
Turbo-coded trellis-based constructions for data hiding
Proceedings of SPIE (April 29 2002)
Design and analysis of data hiding techniques in JPEG 2000...
Proceedings of SPIE (November 19 2003)
Provably robust digital watermarking
Proceedings of SPIE (November 22 1999)
Self-noise suppression schemes in blind image steganography
Proceedings of SPIE (November 22 1999)

Back to Top