Dither Modulation in the Logarithmic Domain
Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ruining the performance of the watermarking system with almost non perceptually altering the watermarked signal. In this paper we propose a new family of quantization-based methods, based on both Dither Modulation and Spread Transform Dither Modulation, oriented to deal with those attacks, and which presents another outstanding property: they produce perceptually shaped watermarks.
KeywordsData Hiding Quantization Step Host Signal Watermark Signal Quantization Index Modulation
Unable to display preview. Download preview PDF.
- 4.Lee, K., Kim, D.S., Moon, K.A.: Amplitude-modification resilient watermarking based on a-law companding. In: IEEE International Conference on Image Processing, September 2003, vol. 3, pp. 459–462 (2003)Google Scholar
- 5.Pérez-González, F., Balado, F., Hernández, J.R.: Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Transactions on Signal Processing 51(4), 960–980 (2003); Special Issue Signal Processing for Data Hiding in Digital Media & Secure Content DeliveryMathSciNetCrossRefGoogle Scholar
- 7.Watson, A.B.: DCT quantization matrices visually optimized for individual images. In: Proceedings of SPIE, vol. 1913(14), pp. 202–216 (1993); Human Vision, Visual Processing and Digital Display IVGoogle Scholar
- 8.Barni, M., Bartolini, F.: Watermarking Systems Engineering. Marcel Dekker, New York (2004)Google Scholar
- 9.Lemma, A., van der Veen, M., Celik, M.: A new modulation based watermarking technique for video. In: Proceedings of SPIE, vol. 6072 (2006); Security, Steganography, and Watermarking of Multimedia Contents VIIIGoogle Scholar