Abstract
In this paper, we analyze the performance of dither modulation (DM) against the composite attacks including valumetric scaling, additive noise and constant change. The analyses are developed under the assumptions that the host vector and noise vector are mutually independent and both of them have independently and identically distributed components. We derive the general expressions of the probability density functions of several concerned signals and the decoding error probability. The specific analytical results are presented for the case of generalized Gaussian host signal. Numerical simulations confirm the validity of the given theoretical analyses.
Chapter PDF
Similar content being viewed by others
Keywords
- Error Probability
- Additive White Gaussian Noise
- Host Signal
- Watermark Signal
- Quantization Index Modulation
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)
Eggers, J.J., Bauml, R., Tzschoppe, R., Girod, B.: Scalar costa scheme for information embedding. IEEE Transactions on Signal Processing 51(4), 1003–1019 (2003)
Pérez-Gonzà lez, F., Balado, F., Martin, J.R.H.: Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Transactions on Signal Processing 51(4), 960–980 (2003)
Bartolini, F., Barni, M., Piva, A.: Performance analysis of st-dm watermarking in presence of nonadditive attacks. IEEE Transactions on Signal Processing 52(10), 2965–2974 (2004)
Boyer, J.P., Duhamel, P., Blanc-Talon, J.: Performance analysis of scalar dc-qim for zero-bit watermarking. IEEE Transactions on Information Forensics and Security 2(2), 283–289 (2007)
Pérez-Gonzà lez, F., Mosquera, C.: Quantization-based data hiding robust to linear-time-invariant filtering. IEEE Transactions on Information Forensics and Security 3(2), 137–152 (2008)
Kalantari, N.K., Ahadi, S.M.: A logarithmic quantization index modulation for perceptually better data hiding. IEEE Transactions on Image Processing 19(6), 1504–1517 (2010)
Saralees, N.: A generalized normal distribution. Journal of Applied Statistics 32(7), 685–694 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, X. (2011). Analyzing the Performance of Dither Modulation in Presence of Composite Attacks. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds) Information and Communications Security. ICICS 2011. Lecture Notes in Computer Science, vol 7043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25243-3_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-25243-3_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25242-6
Online ISBN: 978-3-642-25243-3
eBook Packages: Computer ScienceComputer Science (R0)