Catálogo de publicaciones - libros
Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings
Yun Qing Shi ; Byeungwoo Jeon (eds.)
En conferencia: 5º International Workshop on Digital Watermarking (IWDW) . Jeju Island, South Korea . November 8, 2006 - November 10, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Data Encryption; Operating Systems; Management of Computing and Information Systems; Computers and Society; Multimedia Information Systems; Algorithm Analysis and Problem Complexity
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-48825-5
ISBN electrónico
978-3-540-48827-9
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Cobertura temática
Tabla de contenidos
doi: 10.1007/11922841_1
Watermarking Is Not Cryptography
Ingemar J. Cox; Gwenaël Doërr; Teddy Furon
A number of analogies to cryptographic concepts have been made about watermarking. In this paper, we argue that these analogies are misleading or incorrect, and highlight several analogies to support our argument. We believe that the fundamental role of watermarking is the reliable embedding and detection of information and should therefore be considered a form of communications. We note that the fields of communications and cryptography are quite distinct and while communications systems often combine technologies from the two fields, a layered architecture is applied that requires no knowledge of the layers above. We discuss how this layered approach can be applied to watermarking applications.
Palabras clave: Hash Function; Multimedia Content; Digital Watermark; Message Authentication Code; Quantization Index Modulation.
Pp. 1-15
doi: 10.1007/11922841_2
Secure Quantization Index Modulation Watermark Detection
Ton Kalker; Mike Malkin
In this paper we introduce the problem of watermark security for systems in which an implementation of a watermark detector is available to an attacker. This paper serves as an introduction to a keynote talk at IWDW 2006. This talk will review two homomorphic encryption methods, viz. Paillier and Goldwasser & Micali, and their application to secure detection of Quantization Index Modulation (QIM) watermarks.
Pp. 16-18
doi: 10.1007/11922841_3
Steganalysis in the Presence of Weak Cryptography and Encoding
Andreas Westfeld
Steganography is often combined with cryptographic mechanisms. This enhances steganography by valuable properties that are originally left to cryptographic systems. However, new problems for cryptographic mechanisms arise from the context of steganography. There are two sorts of steganographic tools: commercial tools with insecure or badly implemented cryptography and academic proof-of-concepts that abstain from the actual implementation of the cryptographic part. Comparably to cryptography, steganography evolves in an iterative process of designing and breaking new methods. In this paper we examine the encoding properties and cryptographic functionality of steganographic tools to enable the detection of embedded information in steganograms even if the embedding part was otherwise secure.
Pp. 19-34
doi: 10.1007/11922841_4
Category Attack for LSB Steganalysis of JPEG Images
Kwangsoo Lee; Andreas Westfeld; Sangjin Lee
In this paper, we propose a new method for the detection of LSB embedding in JPEG images. We are motivated by a need to further research the idea of the chi-square attack. The new method simply use the first-order statistics of DCT coefficients, but is more powerful to detect the random embedding in JPEG images. For evaluation, we used versions of Jsteg and Jphide with randomized embedding path to generate stego images in our experiments. In results, the proposed method outperforms the method of Zhang and Ping and is applicable to Jphide. The detection power of both proposed methods is compared to the blind classifier by Fridrich that uses 23 DCT features.
Palabras clave: True Positive Rate; Cover Image; Secret Message; Stego Image; Lena Image.
Pp. 35-48
doi: 10.1007/11922841_5
Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA)
Guorong Xuan; Yun Q. Shi; Cong Huang; Dongdong Fu; Xiuming Zhu; Peiqi Chai; Jianjiong Gao
This paper presents a novel steganalysis scheme with high-dimensional feature vectors derived from co-occurrence matrix in either spatial domain or JPEG coefficient domain, which is sensitive to data embedding process. The class-wise non-principal components analysis (CNPCA) is proposed to solve the problem of the classification in the high-dimensional feature vector space. The experimental results have demonstrated that the proposed scheme outperforms the existing steganalysis techniques in attacking the commonly used steganographic schemes applied to spatial domain (Spread-Spectrum, LSB, QIM) or JPEG domain (OutGuess, F5, Model-Based).
Palabras clave: steganalysis; co-occurrence matrix; class-wise non-principal components analysis (CNPCA).
Pp. 49-60
doi: 10.1007/11922841_6
Multi Bit Plane Image Steganography
Bui Cong Nguyen; Sang Moon Yoon; Heung-Kyu Lee
This paper addresses a novel steganography method for images. Most statistical steganalysis algorithms are strong to defeat previous steganography algorithms. RS steganalysis and pixel difference histogram analysis are two well-known statistical steganalysis algorithms which detect non-random changes caused by embedding a secret message into cover image. In this paper, we first explain how two steganalysis algorithms exploit the effect of the non-random changes and then propose a new steganography method that avoids the non-random changes to evade statistical analysis methods. For this purpose, we adjust the embedding process to be more adaptive to cover image by considering embedding in Gray code bit planes, not natural binary bit planes, of cover images, and two parameters: (1) similarity threshold for selecting non-flat area in lower bit planes, and (2) size of flat blocks n × n in embedding bit planes. Experimental results show that the secret messages embedded by our method are undetectable under RS steganalysis and pixel difference histogram analysis.
Palabras clave: Cover Image; Secret Message; Histogram Analysis; Embed Image; Steganalysis Method.
Pp. 61-70
doi: 10.1007/11922841_7
Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features
Zhe-Ming Lu; Hao Luo; Jeng-Shyang Pan
This paper proposes a reversible watermarking scheme for error diffused halftone images. It exploits statistical features of 2×2 binary patterns in halftone images to embed data. According to a small look-up table constructed in advance, a state sequence is extracted and losslessly compressed, and the saved space is filled up with the watermark and some side information. We modulate the extracted state sequence into a new concatenated sequence by similar pair toggling, and meanwhile the watermark and the LUT are embedded. The proposed scheme can provide a considerable capacity and the original image can be recovered if its watermarked version is intact.
Palabras clave: reversible watermarking; halftone image; statistical features.
Pp. 71-81
doi: 10.1007/11922841_8
Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method
Anja Keskinarkaus; Anu Pramila; Tapio Seppänen; Jaakko Sauvola
In this paper we present a print-scan resilient method to embed multibit messages into images. Multilevel watermarking principles are applied in order to embed a reference watermark and the message bits. Methods to embed a robust spatial domain reference watermark, utilizing HVS are proposed and methods to improve the estimation of affine transformation parameters from a periodic reference watermark are considered. The multibit message is embedded on the approximation coefficients of the wavelet transform, utilizing JND profile estimation and additive spread spectrum techniques. A blind correlation based detection method is made use of to recover the message. In the experiments the imperceptuality issues related to multilevel watermarking are considered with different parameter settings and the robustness against print-scan attack and JPEG compression is measured and the results are shown.
Palabras clave: Watermarking; JND profile estimation; periodic reference water-mark; spread spectrum technique; multilevel technique; affine transformation.
Pp. 82-95
doi: 10.1007/11922841_9
A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes
C. Culnane; H. Treharne; A. T. S. Ho
In this paper we propose a multi-set modulation technique to increase the hiding capacity within a binary document image. As part of this technique we propose an Automatic Threshold Calculation and Threshold Buffering, Shifted Space Distribution and Letter Space Compensation technique. The Automatic Threshold Calculation is used to distinguish word spaces from letter spaces. The Threshold Buffering is used to reduce the chance of misinterpretation of spaces during the detection phase, following printing and scanning. The Shifted Space Distribution and Letter Space Compensation techniques robustly embed a watermark into the binary document image. The Automatic Threshold Calculation has been shown to be successful in identifying word spaces for different types of fonts and font sizes. The combination of the Shifted Space Distribution, Letter Space Compensation and Threshold Buffering techniques have been shown to create a watermark that is robust to printing and scanning.
Palabras clave: Geometric Distortion; Digital Watermark; Black Pixel; Font Size; White Space.
Pp. 96-110
doi: 10.1007/11922841_10
A Novel Multibit Watermarking Scheme Combining Spread Spectrum and Quantization
Xinshan Zhu; Zhi Tang; Liesen Yang
This paper presents a new multibit watermarking method. The method uses multiple orthonormalized watermark patterns of the same size as the host signal. In particular, the elements of each watermark pattern follow independent normal distribution. Each bit of the transmitted message is hidden using the dither quantizers to modify the projection of the host signal onto its corresponding watermark pattern. As a result, every hidden bit is spread over all elements of the host data and the extracting procedure is blind. Meanwhile, we consider how to choose a suitable quantization step size under the given distortion constraint. It is also proved mathematically that the upper bound of the bit error probability of our method is equal to one of the spread-transform dithered modulation (STDM) under the same situations. Experimental results show our scheme performs better than STDM in terms of bit error probability.
Palabras clave: Error Probability; Digital Watermark; Quantization Step; Host Signal; Watermark Signal.
Pp. 111-122