Authors
Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon, Pedro Comesana
Publication date
2006/11/20
Journal
IEEE Transactions on Information Forensics and Security
Volume
1
Issue
4
Pages
421-439
Publisher
IEEE
Description
Security of quantization index modulation (QIM) watermarking methods is usually sought through a pseudorandom dither signal which randomizes the codebook. This dither plays the role of the secret key (i.e., a parameter only shared by the watermarking embedder and decoder), which prevents unauthorized embedding and/or decoding. However, if the same dither signal is reused, the observation of several watermarked signals can provide sufficient information for an attacker to estimate the dither signal. This paper focuses on the cases when the embedded messages are either known or constant. In the first part of this paper, a theoretical security analysis of QIM data hiding measures the information leakage about the secret dither as the mutual information between the dither and the watermarked signals. In the second part, we show how set-membership estimation techniques successfully provide accurate …
Total citations
200520062007200820092010201120122013201420152016201720182019202020212022202311575558632612121
Scholar articles
L Pérez-Freire, F Pérez-González, T Furon… - IEEE Transactions on Information Forensics and …, 2006