Information Technology Reference
In-Depth Information
Λ = N− 1
( S ( n )
− C ( n )) W ( n ) .
n =0
The probabilities P m and P fa can be calculated by (20) and (21). However,
N
m ( η −
µ =
(35)
1)
(It is easy to see that in a general case, when an attacker selects ε ( n )= ε m
and m <m then the corresponding value of µ , according to (35) is increased. If
an attacker selects m >m the same value of µ as it appears in (35) is obtained).
Comparing µ given by (35) and µ 0 by (28), corresponding to the case of no
filtering attack, we can conclude that the tile-based WM system produces a m
times degradation of the WM system with respect to no filtering attack.
3 Simulation Results
Firstly we have used a 1-D simulation in order to check that, indeed, Var Λ 0
Var Λ 1 for any “short” pulse response. We have found that the approximating
relation stated above holds and hence the theoretical formulas (20) and (21) are
correct unless K N
1
2 . Thereafter we examined the effect of filtering attack on
a watermarked 2-D images. Two images,
, have been used to
embed WM in an additive manner according to eq. (1). The attack model was
taken as in (2):
fishboat
and
lena
U e n 1 + n 2
h ( n )= 1
(36)
2 δ 2
where U = n e n 1 + n 2
2 δ 2 . Four different cases have been considered:
O . No filtering attack when both W and
ε
are white noise sequences.
A .
Filtering attack when W is a white noise sequence given by (15) and
ε
is
also a white noise sequence.
B . Filtering attack when W is a colored noise sequence obtained after a passing
of white noise WM sequence through the filter with pulse response (36) and
ε
is still a white noise sequence.
C . Filtering attack when both W and
are colored noise sequences obtained
after a passing of the white noise WM and additive white noise attack se-
quences through the filter with pulse response (36).
ε
The correlation detector (6) has been used to decide whether a WM is present
or not. The results in the calculations of minimum values of WM lengths N to
guarantee P m = P fa =10 3 are presented in Table 1.
Here we can see, in Case A, that the use of filtering attack results in a
significant degradation of the WM system, especially for large δ , because the
number of WM elements required to provide P m = P fa =10 3 increases from
the order of tens to the order of hundreds. Simultaneously we can see in Figure 1
 
Search WWH ::




Custom Search