JPEG Still Image Data Compression Standard
JPEG Still Image Data Compression Standard
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
Adaptive Watermarking in the DCT Domain
ICASSP '97 Proceedings of the 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '97) -Volume 4 - Volume 4
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Hi-index | 0.00 |
An adversary who knows a watermarking scheme can extract the watermarked coefficients and attack them directly. This situation can be understood in a similar way to jamming as known from military communications and system performance can be described in terms of channel capacity and distortion. Using a gradient method, the attack is optimized from the adversary's viewpoint by minimizing channel capacity. It turns out that then for the same level of distortion and equiprobable modulation symbols binary modulation can achieve a higher channel capacity than modulation alphabets of larger size.