Information Technology Reference
In-Depth Information
covert communication in a hostile environment. Nonetheless the technique can be
used in watermarking applications for copyright protection with a high payload and
sufficient robustness.
It should be noted that the dithering attack described in this paper differs in an im-
portant aspect from the generally referred attacks on watermarks such as JPEG com-
pression and conventional signal processing. QIM-embedded watermarks are highly
robust against these attacks. For instance, watermarks in an image can still be ex-
tracted without error when PSNR becomes as low as 20dB after JPEG coding or 28dB
with interference of additive Gaussian noise [5]. By using the dither attack, in con-
trast, the hidden data are completely erased with negligible, or even without, addi-
tional degradation to the image.
Acknowledgements
This work was supported by the National Natural Science Foundation of China (No.
60072030) and Key Disciplinary Development Program of Shanghai (2001-44). The
authors are grateful to the anonymous reviewers for their valuable comments and
recommendations.
References
1. Chen, B., and Wornell, G.: Quantization Index Modulation: a Class of Provably Good
Method for Watermarking and Information Embedding, IEEE Transactions on Information
Theory, 47(4) (2001) 1423-1443
2. Chen, B. and Wornell, G. Dither modulation: A New Approach to Digital Watermarking
and Information Embedding, in Proceedings of the SPIE, 3657 (1999) 342-353
3. Eggers, J.J., and Girod, B.: Quantization Effect on Digital Watermarks, Signal Processing,
81 (2001) 239-263
4. Wang, H., and Wang, S.: Cyber Warfare
Steganography vs. Steganalysis. Communica-
tion of the ACM (in press)
5. Wang, S., Zhang, X., and Ma, T.: Image Watermarking Using Dither Modulation in Dual-
Transform Domain, Journal of the Imaging Society of Japan, 41(4) (2002) 398-402
6. Pratt, W.K.: Digital Image Processing, New York: Wiley (1978)
7. Reininger, R. and Gibson, J.: Distributions of the Two-Dimensional DCT Coefficients for
Images, IEEE Trans. Commun., COM-31 (June, 1983) 835-839
8. Muller, F.: Distribution Shape of Two-Dimensional DCT Coefficients of Natural Images,
Electronics Letters, 29, Oct. 1993, 1935-1936
9. Petitcolas, F.A.P., et al.: Evaluation of Copyright Marking Systems, Proceeding of IEEE
Multimedia Systems' 99, vol.1, pp.574-579, 7-11 June 1999, Florence, Italy
10. Fisk, G. et al.: Eliminating Steganography in Internet Traffic with Active Wardens. In 5th
International Workshop on Information Hiding (2002)
Search WWH ::




Custom Search