Embedding robust labels into images for copyright protection
KnowRight '95 Proceedings of the conference on Intellectual property rights and new technologies
Sparse code shrinkage: denoising by nonlinear maximum likelihood estimation
Proceedings of the 1998 conference on Advances in neural information processing systems II
An asymmetric watermarking method
IEEE Transactions on Signal Processing
IEEE Transactions on Information Theory
Fast and robust fixed-point algorithms for independent component analysis
IEEE Transactions on Neural Networks
Spread-spectrum watermarking security
IEEE Transactions on Information Forensics and Security
Natural watermarking: a secure spread spectrum technique for WOA
IH'06 Proceedings of the 8th international conference on Information hiding
Security evaluation of informed watermarking schemes
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Hi-index | 0.00 |
In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coefficient quantization schemes are investigated. The related works that deal with the security of spread spectrum and quantization schemes are presented and their limits are outlined. The use of independent component analysis (ICA) for natural image is introduced. We show that ICA can be an efficient tool to estimate the quantization noise which is by definition independent of the host signal. We present both a method for estimating the carrier, and an attack that relies on the ICA decomposition of patches of images; our attack scheme is also compared with another classical attack. The results reported in this paper demonstrate how changes in natural image statistics can be used to detect watermarks and devise attacks. Such natural image statistics-based attacks may pose a serious threat against watermarking schemes which are based on quantization techniques.