Data hiding using quantization has revealed as an effective way of taking into account side information at the encoder. When quantizing more than one host signal samples there are two choices: (1) using the Cartesian product of several one-dimensional quantizers, as made in Scalar Costa Scheme (SCS); or (2) performing vectorial quantization. The second option seems better, as rate-distortion theory affirms that higher dimensional quantizers yield improved performance due to better sphere-packing properties. Although the embedding problem does resemble that of rate-distortion, no attacks or host signal characteristics are usually considered when designing the quantizer in this way. We show that attacks worsen the performance of the a priori optimal lattice quantizer through a counterexample: the comparison under Gaussian distortion of hexagonal lattice quantization against bidimensional Distortion-Compensated Quantized Projection (DC-QP), a data hiding alternative based in quantizing a linear projection of the host signal. Apart from empirical comparisons, theoretical lower bounds on the probability of decoding error of hexagonal lattices under Gaussian host signal and attack are provided and compared to the already analyzed DC-QP method.
[1]
Hugh Brunk.
Quantizer characteristics important for quantization index modulation
,
2001,
IS&T/SPIE Electronic Imaging.
[2]
R C Robertson,et al.
Digital Communications Over Fading Channels
,
2004
.
[3]
Gregory W. Wornell,et al.
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
,
2001,
IEEE Trans. Inf. Theory.
[4]
Mehmet Kivanc Mihcak,et al.
ITERATIVELY DECODABLE CODES FOR WATERMARKING APPLICATIONS
,
2000
.
[5]
Allen Gersho,et al.
Asymptotically optimal block quantization
,
1979,
IEEE Trans. Inf. Theory.
[6]
W. Fischer,et al.
Sphere Packings, Lattices and Groups
,
1990
.
[7]
J. Craig.
A new, simple and exact result for calculating the probability of error for two-dimensional signal constellations
,
1991,
MILCOM 91 - Conference record.
[8]
B. Girod,et al.
A blind watermarking scheme based on structured codebooks
,
2000
.
[9]
Fernando Pérez-González,et al.
Performance analysis of existing and new methods for data hiding with known-host information in additive channels
,
2003,
IEEE Trans. Signal Process..