Scale estimation in two-band filter attacks on QIM watermarks

نویسندگان

  • Jinshen Wang
  • Ivo D. Shterev
  • Reginald L. Lagendijk
چکیده

This paper presents a scheme for estimating two-band amplitude scale attack within a quantization-based watermarking context. Quantization-based watermarking schemes comprise a class of watermarking schemes that achieves the channel capacity in terms of additive noise attacks. Unfortunately, Quantization-based watermarking schemes are not robust against Linear Time Invariant (LTI) filtering attacks. We concentrate on a multi-band amplitude scaling attack that modifies the spectrum of the signal using an analysis/synthesis filter bank. First we derive the probability density function (PDF) of the attacked data. Second, using a simplified approximation of the PDF model, we derive a Maximum Likelihood (ML) procedure for estimating two-band amplitude scaling factor. Finally, experiments are performed with synthetic and real audio signals showing the good performance of the proposed estimation technique under realistic conditions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting tampering in audio-visual content using QIM watermarking

This paper presents a framework for detecting tampered information in digital audio-visual content. The proposed framework uses a combination of temporal and spatial watermarks that do not decrease the quality of host videos. A modified version of the Quantization Index Modulation (QIM) algorithm is used to embed watermarks. The fragility of the QIM watermarking algorithm makes it possible to d...

متن کامل

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

Anonymous Fingerprinting with Robust QIM Watermarking Techniques

Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer’s identity as a watermark into the content so that the merchant can retrieve the buyer’s identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer’s identity multiple times, it is es...

متن کامل

Analysis of Robustness of Hybrid Video Watermarking against Multiple Attacks

An efficient video watermarking algorithm using DWT-DCTSVD is proposed to analyze the robustness against various attacks. In this algorithm, video is divided into several groups of frames, so that each group of frames carries various watermarks. In the proposed method, each plane of video frames are decomposed using DWT and high frequency band HH, middle frequency bands LH, HL are transformed w...

متن کامل

Robust Watermarking of Relational Databases Based on Extension of Quantization Index Modulation to Circular Histograms

In the internet and cloud computing paradigms the use of digital data is increasing excessively, where such kind of data is stored in various digital formats and also in related nature as a relational data. Watermarking methods has been proposed for multimedia, digital documents, software and, more recently, for databases. Two categories, depending on application, distinguish watermarks: fragil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006