Abstract
Evaluation of the security of data hiding methods has gained considerable interest recently. The security ofquantisation index modulation (QIM) based watermark embedding methods has previously been investigated for different classes of attacks including known-message attack, known-original attack and watermark-only attack. In this paper, an extreme case of the watermark-only attack scenario is discussed wherein only a single instance of a set of watermarked content is available. We challenge the security of the dither modulation (DM)QIM based embedding method by examining feature space embeddings for time series and images, using a distributionfree algorithm to discover the primary key embedding parameters.
| Original language | English |
|---|---|
| Title of host publication | DSP 2009: 16th International Conference on Digital Signal Processing, Proceedings |
| Place of Publication | Piscataway (US) |
| Publisher | IEEE |
| ISBN (Electronic) | 978-1-4244-3297-4 |
| ISBN (Print) | 978-1-4244-3298-1 |
| DOIs | |
| Publication status | Published - 20 Nov 2009 |
| Event | 16th International Conference on Digital Signal Processing - Santorini, Greece Duration: 5 Jul 2009 → 7 Jul 2009 |
Conference
| Conference | 16th International Conference on Digital Signal Processing |
|---|---|
| Abbreviated title | DSP 2009 |
| Country/Territory | Greece |
| City | Santorini |
| Period | 5/07/09 → 7/07/09 |
Keywords
- DM-QIM
- security
Fingerprint
Dive into the research topics of 'Watermarking: how secure is the DM-QIM embedding technique?'. Together they form a unique fingerprint.Research output
- 8 Citations
- 2 Conference publication
-
EEG/ECG information fusion for epileptic event detection
Bermudez, T., Lowe, D. & Arlaud-Lamborelle, A. M., 20 Nov 2009, DSP 2009: 16th International Conference on Digital Signal Processing, Proceedings. Piscataway (US): IEEE, 8 p.Research output: Chapter in Book/Published conference output › Conference publication
8 Link opens in a new tab Citations (Scopus) -
Exploiting sensitivity of nonorthogonal joint diagonalisation as a security mechanism in steganography
Matam, B. R. & Lowe, D., 5 Jul 2009, DSP 2009: 16th International Conference on Digital Signal Processing, Proceedings. Piscataway (US): IEEE, p. 532-538 7 p.Research output: Chapter in Book/Published conference output › Conference publication
Open AccessFile3 Link opens in a new tab Citations (Scopus)52 Downloads (Pure)
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver