Scale estimation in two-band filter attacks on QIM watermarks
نویسندگان
چکیده
This paper presents a scheme for estimating two-band amplitude scale attack within a quantization-based watermarking context. Quantization-based watermarking schemes comprise a class of watermarking schemes that achieves the channel capacity in terms of additive noise attacks. Unfortunately, Quantization-based watermarking schemes are not robust against Linear Time Invariant (LTI) filtering attacks. We concentrate on a multi-band amplitude scaling attack that modifies the spectrum of the signal using an analysis/synthesis filter bank. First we derive the probability density function (PDF) of the attacked data. Second, using a simplified approximation of the PDF model, we derive a Maximum Likelihood (ML) procedure for estimating two-band amplitude scaling factor. Finally, experiments are performed with synthetic and real audio signals showing the good performance of the proposed estimation technique under realistic conditions.
منابع مشابه
Detecting tampering in audio-visual content using QIM watermarking
This paper presents a framework for detecting tampered information in digital audio-visual content. The proposed framework uses a combination of temporal and spatial watermarks that do not decrease the quality of host videos. A modified version of the Quantization Index Modulation (QIM) algorithm is used to embed watermarks. The fragility of the QIM watermarking algorithm makes it possible to d...
متن کاملAn Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine
Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...
متن کاملAnonymous Fingerprinting with Robust QIM Watermarking Techniques
Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer’s identity as a watermark into the content so that the merchant can retrieve the buyer’s identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer’s identity multiple times, it is es...
متن کاملAnalysis of Robustness of Hybrid Video Watermarking against Multiple Attacks
An efficient video watermarking algorithm using DWT-DCTSVD is proposed to analyze the robustness against various attacks. In this algorithm, video is divided into several groups of frames, so that each group of frames carries various watermarks. In the proposed method, each plane of video frames are decomposed using DWT and high frequency band HH, middle frequency bands LH, HL are transformed w...
متن کاملRobust Watermarking of Relational Databases Based on Extension of Quantization Index Modulation to Circular Histograms
In the internet and cloud computing paradigms the use of digital data is increasing excessively, where such kind of data is stored in various digital formats and also in related nature as a relational data. Watermarking methods has been proposed for multimedia, digital documents, software and, more recently, for databases. Two categories, depending on application, distinguish watermarks: fragil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006