Share Email Print

Proceedings Paper

Worst-case additive attack against quantization-based data-hiding methods
Author(s): Jose-Emilio Vila-Forcen; Sviatoslav Voloshynovskiy; Oleksiy J. Koval; Fernando Perez-Gonzalez; Thierry Pun
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

The main goal of this study consists in the development of the additive worst case attack (WCA) for quantization-based methods from two points of view: the bit error rate probability and from the rerspective of the information theoretic performance. Our analysis will be focused on the practical scheme known as distortion compensation dither modulation (DC-DM). From the mathematical point of view, the problem of the WCA design with probability of error as the cost function can be formulated as the maximization of the average probability of error subject to introduced distortion for a given decoding rule. When mutual information is selected as cost function, the problem of the WCA design establishes the global maximum of the optimization problem independently of the decodification process. Our results contribute to the common understanding and the development of fair benchmarks. The results show that the developed noise attack leads to a stronger performance decrease for the considered class of embedding techniques than the AWGN or the uniform noise attacks within the class of additive noise attacks.

Paper Details

Date Published: 21 March 2005
PDF: 11 pages
Proc. SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, (21 March 2005); doi: 10.1117/12.586263
Show Author Affiliations
Jose-Emilio Vila-Forcen, Univ. of Geneva (Switzerland)
Sviatoslav Voloshynovskiy, Univ. of Geneva (Switzerland)
Oleksiy J. Koval, Univ. of Geneva (Switzerland)
Fernando Perez-Gonzalez, Univ. of Vigo (Spain)
Thierry Pun, Univ. of Geneva (Switzerland)

Published in SPIE Proceedings Vol. 5681:
Security, Steganography, and Watermarking of Multimedia Contents VII
Edward J. Delp III; Ping W. Wong, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?