Watermarking: how secure is the DM-QIM embedding technique?

Basava R. Matam, David Lowe

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Evaluation of the security of data hiding methods has gained considerable interest recently. The security ofquantisation index modulation (QIM) based watermark embedding methods has previously been investigated for different classes of attacks including known-message attack, known-original attack and watermark-only attack. In this paper, an extreme case of the watermark-only attack scenario is discussed wherein only a single instance of a set of watermarked content is available. We challenge the security of the dither modulation (DM)QIM based embedding method by examining feature space embeddings for time series and images, using a distributionfree algorithm to discover the primary key embedding parameters.

Original languageEnglish
Title of host publicationDSP 2009: 16th International Conference on Digital Signal Processing, Proceedings
Place of PublicationPiscataway (US)
PublisherIEEE
ISBN (Electronic)978-1-4244-3297-4
ISBN (Print)978-1-4244-3298-1
DOIs
Publication statusPublished - 20 Nov 2009
Event16th International Conference on Digital Signal Processing - Santorini, Greece
Duration: 5 Jul 20097 Jul 2009

Conference

Conference16th International Conference on Digital Signal Processing
Abbreviated titleDSP 2009
CountryGreece
CitySantorini
Period5/07/097/07/09

Keywords

  • DM-QIM
  • security

Fingerprint Dive into the research topics of 'Watermarking: how secure is the DM-QIM embedding technique?'. Together they form a unique fingerprint.

  • Research Output

    • 2 Conference contribution

    EEG/ECG information fusion for epileptic event detection

    Bermudez, T., Lowe, D. & Arlaud-Lamborelle, A. M., 20 Nov 2009, DSP 2009: 16th International Conference on Digital Signal Processing, Proceedings. Piscataway (US): IEEE, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Exploiting sensitivity of nonorthogonal joint diagonalisation as a security mechanism in steganography

    Matam, B. R. & Lowe, D., 5 Jul 2009, DSP 2009: 16th International Conference on Digital Signal Processing, Proceedings. Piscataway (US): IEEE, p. 532-538 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Cite this

    Matam, B. R., & Lowe, D. (2009). Watermarking: how secure is the DM-QIM embedding technique? In DSP 2009: 16th International Conference on Digital Signal Processing, Proceedings IEEE. https://doi.org/10.1109/ICDSP.2009.5201248