A Bootstrap Attack on Digital Watermarks in the Frequency Domain
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Performance analysis of Fridrich-Goljan self-embedding authentication method
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Image Processing
A secure partition-based document image watermarking scheme
International Journal of Information and Computer Security
Statistics- and spatiality-based feature distance measure for error resilient image authentication
Transactions on data hiding and multimedia security II
Perceptual image hashing based on virtual watermark detection
IEEE Transactions on Image Processing
NFD technique for efficient and secured information hiding in low resolution images
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Witsenhausen's counterexample and its links with multimedia security problems
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Hi-index | 0.01 |
This paper develops a joint hashing/watermarking scheme in which a short hash of the host signal is available to a detector. Potential applications include content tracking on public networks and forensic identification. The host data into which the watermark is embedded are selected from a secret subset of the full-frame discrete cosine transform of an image, and the watermark is inserted through multiplicative embedding. The hash is a binary version of selected original image coefficients. We propose a maximum likelihood watermark detector based on a statistical image model. The availability of a hash as side information to the detector modifies the posterior distribution of the marked coefficients. We derive Chernoff bounds on the receiver operating characteristic performance of the detector. We show that host-signal interference can be rejected if the hash function is suitably designed. The relative difficulty of an eavesdropper's detection problem is also determined; the eavesdropper does not know the secret key used. Monte Carlo simulations are performed using photographic test images. Finally, various attacks on the watermarked image are introduced to study the robustness of the derived detectors. The joint hashing/watermarking scheme outperforms the traditional "hashless" watermarking technique.