Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation

  • Kaiwen Zhang
  • Shuozhong Wang
  • Xinpeng Zhang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2776)


Methods of attack on watermarks embedded with quantization index modulation and block DCT are introduced in this paper. The proposed method can detect the presence of hidden data by analyzing the histogram or spectrum of the transform coefficients, and prevent their extraction without further degrading the image. It is shown that, in some cases, the embedding-induced distortion can even be reduced in terms of peak-signal-to-noise ratio. Experimental results are given to show the effectiveness of the method.


Hide Data Digital Watermark Quantization Step Watermark Embedding Quantization Index Modulation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chen, B., Wornell, G.: Quantization Index Modulation: a Class of Provably Good Method for Watermarking and Information Embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    Chen, B., Wornell, G.: Dither modulation: A New Approach to Digital Watermarking and Information Embedding. In: Proceedings of the SPIE, vol. 3657, pp. 342–353 (1999)Google Scholar
  3. 3.
    Eggers, J.J., Girod, B.: Quantization Effect on Digital Watermarks, Signal Processing 81, 239–263 (2001)zbMATHGoogle Scholar
  4. 4.
    Wang, H., and Wang, S.: Cyber Warfare— Steganography vs. Steganalysis. Communication of the ACM (in press) Google Scholar
  5. 5.
    Wang, S., Zhang, X., Ma, T.: Image Watermarking Using Dither Modulation in Dual- Transform Domain. Journal of the Imaging Society of Japan 41(4), 398–402 (2002)Google Scholar
  6. 6.
    Pratt, W.K.: Digital Image Processing, New York. Wiley, Chichester (1978)Google Scholar
  7. 7.
    Reininger, R., Gibson, J.: Distributions of the Two-Dimensional DCT Coefficients for Images. IEEE Trans. Commun., COM-31, 835–839 (June 1983)Google Scholar
  8. 8.
    Muller, F.: Distribution Shape of Two-Dimensional DCT Coefficients of Natural Images. Electronics Letters 29, 1935–1936 (1993)CrossRefGoogle Scholar
  9. 9.
    Petitcolas, F.A.P., et al.: Evaluation of Copyright Marking Systems. In: Proceeding of IEEE Multimedia Systems 1999, Florence, Italy, June 7-11, vol. 1, pp. 574–579 (1999)Google Scholar
  10. 10.
    Fisk, G., et al.: Eliminating Steganography in Internet Traffic with Active Wardens. In: 5th International Workshop on Information Hiding (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Kaiwen Zhang
    • 1
  • Shuozhong Wang
    • 1
  • Xinpeng Zhang
    • 1
  1. 1.Communication & Information EngineeringShanghai UniversityShanghaiChina

Personalised recommendations