A Theory for Multiresolution Signal Decomposition: The Wavelet Representation
IEEE Transactions on Pattern Analysis and Machine Intelligence
Cryptographic copyright protection for digital images based on watermarking techniques
Theoretical Computer Science - Special issue: cryptography
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Digital Image Processing
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
An Analysis of One of the SDMI Candidates
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Evaluation of Copyright Marking Systems
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Optimal differential energy watermarking of DCT encoded images and video
IEEE Transactions on Image Processing
Wavelet tree quantization for copyright protection watermarking
IEEE Transactions on Image Processing
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Multimedia Tools and Applications
Multimedia Tools and Applications
Hi-index | 0.00 |
Here we study a recently proposed watermarking scheme based on “Wavelet Tree Quantization” (WTQ) which has been presented by Wang and Lin in IEEE Transactions on Image Processing, February 2004. In the scheme, the wavelet coefficients corresponding to same spatial locations are grouped together. Two such groups, selected at random, are merged to form a super tree. Some of these super trees are quantized to embed the watermark signal in the image. In the process of cryptanalysis we can identify the groups which are quantized during watermark insertion process. We then select the non-quantized groups and quantize them to remove the watermark. Experimental results show that the watermark is completely removed by this attack. The cryptanalysis falls under cipher text only jamming attack which requires a single watermarked copy.