• DocumentCode
    2919932
  • Title

    Watermarking: How secure is the DM-QIM embedding technique?

  • Author

    Matam, B.R. ; Lowe, David

  • Author_Institution
    Aston Univ., Birmingham, UK
  • fYear
    2009
  • fDate
    5-7 July 2009
  • Firstpage
    1
  • Lastpage
    8
  • Abstract
    Evaluation of the security of data hiding methods has gained considerable interest recently. The security of quantisation index modulation (QIM) based watermark embedding methods has previously been investigated for different classes of attacks including known-message attack, known-original attack and watermark-only attack. In this paper, an extreme case of the watermark-only attack scenario is discussed wherein only a single instance of a set of watermarked content is available. We challenge the security of the dither modulation (DM)-QIM based embedding method by examining feature space embeddings for time series and images, using a distribution-free algorithm to discover the primary key embedding parameters.
  • Keywords
    steganography; time series; watermarking; DM-QIM embedding technique; data hiding methods; distribution-free algorithm; dither modulation; known-message attack; known-original attack; quantisation index modulation; time series; watermark embedding methods; watermark-only attack; Data encapsulation; Data security; Delta modulation; Independent component analysis; Information security; Quantization; Statistical analysis; Steganography; Watermarking; Writing; DM-QIM; Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Digital Signal Processing, 2009 16th International Conference on
  • Conference_Location
    Santorini-Hellas
  • Print_ISBN
    978-1-4244-3297-4
  • Electronic_ISBN
    978-1-4244-3298-1
  • Type

    conf

  • DOI
    10.1109/ICDSP.2009.5201248
  • Filename
    5201248