2006
DOI: 10.1109/tifs.2006.879299
|View full text |Cite
|
Sign up to set email alerts
|

Block QIM Watermarking Games

Abstract: While binning is a fundamental approach to blind data embedding and watermarking, an attacker may devise various strategies to reduce the effectiveness of practical binning schemes. The problem analyzed in this paper is design of worst-case noise distributions against L-dimensional lattice Quantization Index Modulation (QIM) watermarking codes. The cost functions considered are (1) probability of error of the maximum-likelihood decoder, and (2) the more tractable Bhattacharyya upper bound on error probability,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 39 publications
(59 reference statements)
0
4
0
Order By: Relevance
“…A possible improvement using permutations was briefly considered in Section VII, but dither estimation attacks still seem to be possible, at least with low-dimensional lattices. A new strategy, recently proposed in [39], is the application of secret rotations to the embedding lattice. This approach, in conjunction with permutations, still keeps the structure of the codebook (which is desirable from an implementation point of view) while increasing its a priori entropy.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…A possible improvement using permutations was briefly considered in Section VII, but dither estimation attacks still seem to be possible, at least with low-dimensional lattices. A new strategy, recently proposed in [39], is the application of secret rotations to the embedding lattice. This approach, in conjunction with permutations, still keeps the structure of the codebook (which is desirable from an implementation point of view) while increasing its a priori entropy.…”
Section: Discussionmentioning
confidence: 99%
“…If the covariance matrix of the estimation error is given by , then it is immediate to upperbound its entropy by (37) Furthermore, note that (38) since is a function of the observations. Thus (39) where the second inequality follows from the fact that …”
Section: Bounds On the Estimation Errormentioning
confidence: 99%
“…If the covariance matrix of the estimation error is given by , then it is immediate to upperbound its entropy by (37) Furthermore, note that (38) since is a function of the observations. Thus (39) where the second inequality follows from the fact that ([6] Theorem 16.8.4). Let us define the variance per dimension of the estimation error as .…”
Section: Bounds On the Estimation Errormentioning
confidence: 99%
“…Among different types of watermarking methods, quantization index modulation (QIM) is one of the most popular techniques due to its lossless perfonnance with lattice-based codebooks. As a matter of fact, several optimized QIM watennarking schemes, namely asymptotically optimal scalar quantizers for watermark detection [1], distortion-compensated lat tice QIM using nearly spherical Voronoi cells for asymptotically capacity-achieving [2], block QIM watermarking game [3], minmax strategies subjects to attacker's memory [4] and several other solutions are proposed. Since watennarking on compressed host data is highly demanding in recent times, optimization in the context of joint watennarking and compression (JWC) also draws attention to research community.…”
Section: Introductionmentioning
confidence: 99%