Dither Modulation in the Logarithmic Domain

  • Pedro Comesaña
  • Fernando Pérez-González
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5041)


Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ruining the performance of the watermarking system with almost non perceptually altering the watermarked signal. In this paper we propose a new family of quantization-based methods, based on both Dither Modulation and Spread Transform Dither Modulation, oriented to deal with those attacks, and which presents another outstanding property: they produce perceptually shaped watermarks.


Data Hiding Quantization Step Host Signal Watermark Signal Quantization Index Modulation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Abrardo, A., Barni, M.: Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding. IEEE Transactions on Signal Processing 53(2), 824–833 (2005)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Pérez-González, F., Mosquera, C., Barni, M., Abrardo, A.: Rational dither modulation: a high-rate data-hiding method robust to gain attacks. IEEE Transaction on Signal Processing 53(10), 3960–3975 (2005)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Lee, K., Kim, D.S., Moon, K.A.: Amplitude-modification resilient watermarking based on a-law companding. In: IEEE International Conference on Image Processing, September 2003, vol. 3, pp. 459–462 (2003)Google Scholar
  5. 5.
    Pérez-González, F., Balado, F., Hernández, J.R.: Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Transactions on Signal Processing 51(4), 960–980 (2003); Special Issue Signal Processing for Data Hiding in Digital Media & Secure Content DeliveryMathSciNetCrossRefGoogle Scholar
  6. 6.
    Bartolini, F., Barni, M., Piva, A.: Performance analysis of ST-DM watermarking in presence of nonadditive attacks. IEEE Transactions on Signal Processing 52(10), 2965–2974 (2004)CrossRefGoogle Scholar
  7. 7.
    Watson, A.B.: DCT quantization matrices visually optimized for individual images. In: Proceedings of SPIE, vol. 1913(14), pp. 202–216 (1993); Human Vision, Visual Processing and Digital Display IVGoogle Scholar
  8. 8.
    Barni, M., Bartolini, F.: Watermarking Systems Engineering. Marcel Dekker, New York (2004)Google Scholar
  9. 9.
    Lemma, A., van der Veen, M., Celik, M.: A new modulation based watermarking technique for video. In: Proceedings of SPIE, vol. 6072 (2006); Security, Steganography, and Watermarking of Multimedia Contents VIIIGoogle Scholar
  10. 10.
    Comesaña, P., Pérez-González, F., Balado, F.: On distortion-compesated dither modulation data-hiding with repetition coding. IEEE Transactions on Signal Processing 54(2), 585–600 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Pedro Comesaña
    • 1
  • Fernando Pérez-González
    • 1
  1. 1.Signal Theory and Communications DepartmentUniversity of VigoVigoSpain

Personalised recommendations