Scale estimation in two-band filter attacks on QIM watermarks

This paper presents a scheme for estimating two-band amplitude scale attack within a quantization-based watermarking context. Quantization-based watermarking schemes comprise a class of watermarking schemes that achieves the channel capacity in terms of additive noise attacks. Unfortunately, Quantization-based watermarking schemes are not robust against Linear Time Invariant (LTI) filtering attacks. We concentrate on a multi-band amplitude scaling attack that modifies the spectrum of the signal using an analysis/synthesis filter bank. First we derive the probability density function (PDF) of the attacked data. Second, using a simplified approximation of the PDF model, we derive a Maximum Likelihood (ML) procedure for estimating two-band amplitude scaling factor. Finally, experiments are performed with synthetic and real audio signals showing the good performance of the proposed estimation technique under realistic conditions.

[1]  Fernando Pérez-González,et al.  Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[2]  Bernd Girod,et al.  Estimation of amplitude modifications before SCS watermark detection , 2002, IS&T/SPIE Electronic Imaging.

[3]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[4]  Reginald L. Lagendijk,et al.  Maximum likelihood amplitude scale estimation for quantization-based watermarking in the presence of dither , 2005, IS&T/SPIE Electronic Imaging.

[5]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[6]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[7]  Ingemar J. Cox,et al.  Dirty-paper trellis codes for watermarking , 2002, Proceedings. International Conference on Image Processing.

[8]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.