Analysis of the “Wavelet Tree Quantization” watermarking strategy and a modified robust scheme

Here we study a recently proposed watermarking scheme based on the paper “Wavelet Tree Quantization” (WTQ) by Wang and Lin (IEEE Trans Image Process 13(2):154–165, 2004). In given scheme, wavelet coefficients corresponding to the same spatial locations are grouped together. Two such groups, selected at random, constitute a supertree. Some of these supertrees are quantized to embed the watermark information in the image. In the process of cryptanalysis we first identify the groups which are quantized during the watermark insertion process. Then we select the non-quantized groups and quantize them too, to remove the watermark. Experimental results show that the watermark is completely removed by this attack. The cryptanalysis falls under the cipher text only jamming attack which requires only a single watermarked copy. Further, we suitably modify the WTQ scheme to make it robust against such cryptanalytic attacks.

[1]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .

[2]  Reginald L. Lagendijk,et al.  Optimal differential energy watermarking of DCT encoded images and video , 2001, IEEE Trans. Image Process..

[3]  Deepa Kundur Improved Digital Watermarking Through Diversity and Attack Characterization , 1999 .

[4]  Sushil Jajodia,et al.  Recovery of Watermarks from Distorted Images , 1999, Information Hiding.

[5]  Thierry Pun,et al.  Cryptographic Copyright Protection for Digital Images Based on Watermarking Techniques , 1999, Theor. Comput. Sci..

[6]  C.-C. Jay Kuo,et al.  Watermark design for embedded wavelet image codec , 1998, Optics & Photonics.

[7]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[8]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[9]  Subhamoy Maitra,et al.  Cryptanalysis of correlation-based watermarking schemes using single watermarked copy , 2004, IEEE Signal Processing Letters.

[10]  Julien P. Stern,et al.  An Analysis of One of the SDMI Candidates , 2001, Information Hiding.

[11]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[12]  Ramarathnam Venkatesan,et al.  Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks , 2002, Information Hiding.

[13]  Stéphane Mallat,et al.  A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..

[14]  Yuan-Pei Lin,et al.  Wavelet tree quantization for copyright protection watermarking , 2004, IEEE Trans. Image Process..

[15]  Andreas Uhl,et al.  Watermark security via wavelet filter parametrization , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[16]  Joe Kilian,et al.  A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.

[17]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[18]  Darko Kirovski,et al.  Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.

[19]  Jean-Paul M. G. Linnartz,et al.  Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[20]  Ross J. Anderson,et al.  Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[21]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[22]  Darko Kirovski,et al.  Embedding and detecting spread-spectrum watermarks under estimation attacks , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[23]  Subhamoy Maitra,et al.  Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme , 2005, IEEE Transactions on Signal Processing.

[24]  G. A Theory for Multiresolution Signal Decomposition : The Wavelet Representation , 2004 .

[25]  Teddy Furon,et al.  Watermarking security part one: Theory , 2005, IS&T/SPIE Electronic Imaging.

[26]  Jiri Fridrich,et al.  Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.

[27]  Yiwei Wang,et al.  A wavelet-based watermarking algorithm for ownership verification of digital images , 2002, IEEE Trans. Image Process..