Share Email Print

Proceedings Paper

Capacity of data-hiding system subject to desynchronization
Format Member Price Non-Member Price
PDF $17.00 $21.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Data hiding has been mainly studied in the last years. Many applications are targeted such as copy-rights management, meta-data embedding for rich-media applications, ... In all these applications, it is crucial to estimate what is the capacity of data hiding. Many works have then been made to study watermarking performance considering data-hiding as a kind of channel communication. However in all these studies, an assumption is made about the perfect knowledge of all attacks parameters (may be known in advance or later estimated with attacks modeling). More especially a malicious attacker may biased its attack so that parameters estimation may not be perfect (desynchronization in parameters). Furthermore, random geometrical attacks for images such as proposed by Stirmark benchmark (more generally desynchronization attacks) show that perfect synchronization may not also be achievable. These last kind of attacks are actually the most effective and lack of theoretical modeling for capacity estimation. We then propose a new model for taking into account desynchronization phenomenon in data hiding (coupled with degrading attacks - i.e. optimal SAWGN attacks). Further, thanks to the use of game theory, we state bounds on the capacity that may be obtained by data hiding systems when subject to desynchronization.

Paper Details

Date Published: 22 June 2004
PDF: 10 pages
Proc. SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, (22 June 2004); doi: 10.1117/12.525786
Show Author Affiliations
Stephane Pateux, IRISA/INRIA-Rennes (France)
Gaetan Le Guelvouit, IRISA/INRIA-Rennes (France)
Jonathan Delhumeau, IRISA/INRIA-Rennes (France)

Published in SPIE Proceedings Vol. 5306:
Security, Steganography, and Watermarking of Multimedia Contents VI
Edward J. Delp III; Ping W. Wong, Editor(s)

© SPIE. Terms of Use
Back to Top