2006
DOI: 10.1109/tsp.2006.881216
|View full text |Cite
|
Sign up to set email alerts
|

Amplitude Scale Estimation for Quantization-Based Watermarking

Abstract: Abstract-In this paper we propose a maximum likelihood technique to combat amplitude scaling attacks within a quantizationbased watermarking context. We concentrate on operations that are common in many applications and at the same time devastating to this class of watermarking schemes, namely, amplitude scaling in combination with additive noise. First we derive the probability density function of the watermarked and attacked data in the absence of subtractive dither. Next we extend these models to incorporat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(36 citation statements)
references
References 20 publications
0
34
0
Order By: Relevance
“…• The third type of methods estimate the scaling factor based on the structure of the received data (Eggers, Bäuml & Girod, 2002;Lagendijk & Shterev, 2004;Shterev & Lagendijk, 2006). • The fourth type of methods embed the watermark in the gain-invariant domains (Ourique et al, 2005;Perez-Gonzalez et al, 2005).…”
Section: Quantization-based Watermarkingmentioning
confidence: 99%
“…• The third type of methods estimate the scaling factor based on the structure of the received data (Eggers, Bäuml & Girod, 2002;Lagendijk & Shterev, 2004;Shterev & Lagendijk, 2006). • The fourth type of methods embed the watermark in the gain-invariant domains (Ourique et al, 2005;Perez-Gonzalez et al, 2005).…”
Section: Quantization-based Watermarkingmentioning
confidence: 99%
“…A number of algorithms have recently been proposed to counter this [3]- [8], specifically rational dither modulation (RDM) [4], adaptive QIM using a modified Watson distance (QIM-MW) [5] and adaptive RDM using a modified Watson distance (RDM-MW) [7]. These latter methods are based on adaptively changing the quantization step size.…”
Section: A Adaptive Qimmentioning
confidence: 99%
“…The problem of valumetric scaling has received widespread attention and a number of solutions have been proposed [3]- [8]. In contrast, there has been only limited research focused on the issue of re-quantization, among which JPEG compression is a typical one.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, many schemes such as the use of pilot signals [5][6][7], the design of amplitude scale invariant codes [8][9][10]16] and the AQIM method [1,13] have been proposed to tackle this problem. Among all the above mentioned methods, the AQIM method [1] is the most simple and effective watermarking scheme that can resist the gain Contents lists available at ScienceDirect journal homepage: www.elsevier.com/locate/image attacks.…”
Section: Introductionmentioning
confidence: 99%