Skip to main content

Cryptanalysis of “Wavelet Tree Quantization” Watermarking Scheme

  • Conference paper
Book cover Distributed Computing - IWDC 2004 (IWDC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3326))

Included in the following conference series:

Abstract

Here we study a recently proposed watermarking scheme based on “Wavelet Tree Quantization” (WTQ) which has been presented by Wang and Lin in IEEE Transactions on Image Processing, February 2004. In the scheme, the wavelet coefficients corresponding to same spatial locations are grouped together. Two such groups, selected at random, are merged to form a super tree. Some of these super trees are quantized to embed the watermark signal in the image. In the process of cryptanalysis we can identify the groups which are quantized during watermark insertion process. We then select the non-quantized groups and quantize them to remove the watermark. Experimental results show that the watermark is completely removed by this attack. The cryptanalysis falls under cipher text only jamming attack which requires a single watermarked copy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J., Petitcolas, F.A.P.: On The Limits of Steganography. IEEE Journal of Selected Areas in Communications. Special Issue on Copyright and Privacy Protection 16(4), 474–481 (1998)

    Google Scholar 

  2. Boeuf, J., Stern, J.P.: An Analysis of One of the SDMI Candidates. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 395–410. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Das, T.K., Maitra, S.: Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 135–148. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Das, T.K., Maitra, S.: Cryptanalysis of Correlation Based Watermarking Schemes using Single Watermarked Copy. IEEE Signal Processing Letters 11(4), 446–449 (2004)

    Article  Google Scholar 

  5. Ergun, F., Kilian, J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140–149. Springer, Heidelberg (1999)

    Google Scholar 

  6. Gonzalez, R.C., Wintz, P.: Digital Image Processing. Addison-Wesley Publishing, MA (1988)

    Google Scholar 

  7. Kalker, T., Linnartz, J.P.M.G., Dijk, M.v.: Watermark Estimation through Detector Analysis. In: International Conference on Image Processing (1998)

    Google Scholar 

  8. Katzenbeisser, S., Petitcolas, F.A.P. (eds.): Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, USA (2000)

    Google Scholar 

  9. Kerckhoffs, A.: La Cryptographie Militaire. Journal des Sciences Militaires, 9th series, IX, 5–38 (January 1883); 161–191 (February 1883)

    Google Scholar 

  10. Kirovski, D., Malvar, H.S.: Embedding and Detecting Spread-Spectrum Watermarks under the Estimation Attack. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (2002)

    Google Scholar 

  11. Kirovski, D., Petitcolas, F.A.P.: Replacement Attack on Arbitrary Watermarking Systems. In: ACM Workshop on Digital Rights Management (2002)

    Google Scholar 

  12. Langelaar, G.C., Lagendijk, R.L.: Optimal Differential Energy Watermarking of DCT Encoded Images and Video. IEEE Transactions on Image Processing 10(1), 148–158 (2001)

    Article  MATH  Google Scholar 

  13. Mallet, S.G.: A theory of multi resolution signal decomposition: the Wavelet representation. IEEE Transactions on PAMI 11, 674–693 (1989)

    Google Scholar 

  14. Mihcak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 226–246. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G., Aucsmith, D.: Attacks on Copyright Marking Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  16. Petitcolas, F.A.P., Anderson, R.J.: Evaluation of Copyright Marking Systems. In: IEEE Multimedia Systems, Florence, Italy (June 1999)

    Google Scholar 

  17. Ruanaidh, J.O., Petersen, H., Herrigel, A., Pereira, S., Pun, T.: Cryptographic copyright protection for digital images based on watermarking techniques. Theoretical Computer Science 226, 117–142 (1999)

    Article  MATH  Google Scholar 

  18. Wang, S.-H., Lin, Y.-P.: Wavelet Tree Quantization for Copyright Protection Watermarking. IEEE Transactions on Image Processing 13(2), 154–165 (2004)

    Article  Google Scholar 

  19. http://www.hacksdmi.org

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Das, T.K., Maitra, S. (2004). Cryptanalysis of “Wavelet Tree Quantization” Watermarking Scheme. In: Sen, A., Das, N., Das, S.K., Sinha, B.P. (eds) Distributed Computing - IWDC 2004. IWDC 2004. Lecture Notes in Computer Science, vol 3326. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30536-1_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30536-1_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24076-1

  • Online ISBN: 978-3-540-30536-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics