Analyzing the Performance of Dither Modulation in Presence of Composite Attacks

  • Xinshan Zhu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7043)


In this paper, we analyze the performance of dither modulation (DM) against the composite attacks including valumetric scaling, additive noise and constant change. The analyses are developed under the assumptions that the host vector and noise vector are mutually independent and both of them have independently and identically distributed components. We derive the general expressions of the probability density functions of several concerned signals and the decoding error probability. The specific analytical results are presented for the case of generalized Gaussian host signal. Numerical simulations confirm the validity of the given theoretical analyses.


Error Probability Additive White Gaussian Noise Host Signal Watermark Signal Quantization Index Modulation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Eggers, J.J., Bauml, R., Tzschoppe, R., Girod, B.: Scalar costa scheme for information embedding. IEEE Transactions on Signal Processing 51(4), 1003–1019 (2003)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Pérez-Gonzàlez, F., Balado, F., Martin, J.R.H.: Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Transactions on Signal Processing 51(4), 960–980 (2003)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Bartolini, F., Barni, M., Piva, A.: Performance analysis of st-dm watermarking in presence of nonadditive attacks. IEEE Transactions on Signal Processing 52(10), 2965–2974 (2004)CrossRefGoogle Scholar
  5. 5.
    Boyer, J.P., Duhamel, P., Blanc-Talon, J.: Performance analysis of scalar dc-qim for zero-bit watermarking. IEEE Transactions on Information Forensics and Security 2(2), 283–289 (2007)CrossRefGoogle Scholar
  6. 6.
    Pérez-Gonzàlez, F., Mosquera, C.: Quantization-based data hiding robust to linear-time-invariant filtering. IEEE Transactions on Information Forensics and Security 3(2), 137–152 (2008)CrossRefGoogle Scholar
  7. 7.
    Kalantari, N.K., Ahadi, S.M.: A logarithmic quantization index modulation for perceptually better data hiding. IEEE Transactions on Image Processing 19(6), 1504–1517 (2010)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Saralees, N.: A generalized normal distribution. Journal of Applied Statistics 32(7), 685–694 (2005)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Xinshan Zhu
    • 1
  1. 1.Information Engineering College of Yangzhou UniversityYangzhouChina

Personalised recommendations