Elements of information theory
Elements of information theory
Quantization-based watermarking performance improvement using host statistics: AWGN attack case
Proceedings of the 2004 workshop on Multimedia and security
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Watermarking Systems Engineering (Signal Processing and Communications, 21)
IEEE Transactions on Signal Processing
Scalar Costa scheme for information embedding
IEEE Transactions on Signal Processing
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
On the error exponent and capacity games of private watermarking systems
IEEE Transactions on Information Theory
Information-theoretic analysis of information hiding
IEEE Transactions on Information Theory
On the capacity game of public watermarking systems
IEEE Transactions on Information Theory
Hi-index | 0.00 |
The main goal of this study consists in the development of the worst case additive attack (WCAA) for |µ|-ary quantization-based data-hiding methods using as design criteria the error probability and the maximum achievable rate of reliable communications. Our analysis focuses on the practical scheme known as distortion-compensated dither modulation (DC-DM). From the mathematical point of view, the problem of the worst case attack (WCA) design using probability of error as a cost function is formulated as the maximization of the average probability of error subject to the introduced distortion for a given decoding rule. When mutual information is selected as a cost function, a solution of the minimization problem should provide such an attacking noise probability density function (pdf) that will maximally decrease the rate of reliable communications for an arbitrary decoder structure. The obtained results demonstrate that, within the class of additive attacks, the developed attack leads to a stronger performance decrease for the considered class of embedding techniques than the additive white Gaussian or uniform noise attacks.