Abstract
Here we study a recently proposed watermarking scheme based on “Wavelet Tree Quantization” (WTQ) which has been presented by Wang and Lin in IEEE Transactions on Image Processing, February 2004. In the scheme, the wavelet coefficients corresponding to same spatial locations are grouped together. Two such groups, selected at random, are merged to form a super tree. Some of these super trees are quantized to embed the watermark signal in the image. In the process of cryptanalysis we can identify the groups which are quantized during watermark insertion process. We then select the non-quantized groups and quantize them to remove the watermark. Experimental results show that the watermark is completely removed by this attack. The cryptanalysis falls under cipher text only jamming attack which requires a single watermarked copy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R.J., Petitcolas, F.A.P.: On The Limits of Steganography. IEEE Journal of Selected Areas in Communications. Special Issue on Copyright and Privacy Protection 16(4), 474–481 (1998)
Boeuf, J., Stern, J.P.: An Analysis of One of the SDMI Candidates. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 395–410. Springer, Heidelberg (2001)
Das, T.K., Maitra, S.: Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 135–148. Springer, Heidelberg (2002)
Das, T.K., Maitra, S.: Cryptanalysis of Correlation Based Watermarking Schemes using Single Watermarked Copy. IEEE Signal Processing Letters 11(4), 446–449 (2004)
Ergun, F., Kilian, J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140–149. Springer, Heidelberg (1999)
Gonzalez, R.C., Wintz, P.: Digital Image Processing. Addison-Wesley Publishing, MA (1988)
Kalker, T., Linnartz, J.P.M.G., Dijk, M.v.: Watermark Estimation through Detector Analysis. In: International Conference on Image Processing (1998)
Katzenbeisser, S., Petitcolas, F.A.P. (eds.): Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, USA (2000)
Kerckhoffs, A.: La Cryptographie Militaire. Journal des Sciences Militaires, 9th series, IX, 5–38 (January 1883); 161–191 (February 1883)
Kirovski, D., Malvar, H.S.: Embedding and Detecting Spread-Spectrum Watermarks under the Estimation Attack. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (2002)
Kirovski, D., Petitcolas, F.A.P.: Replacement Attack on Arbitrary Watermarking Systems. In: ACM Workshop on Digital Rights Management (2002)
Langelaar, G.C., Lagendijk, R.L.: Optimal Differential Energy Watermarking of DCT Encoded Images and Video. IEEE Transactions on Image Processing 10(1), 148–158 (2001)
Mallet, S.G.: A theory of multi resolution signal decomposition: the Wavelet representation. IEEE Transactions on PAMI 11, 674–693 (1989)
Mihcak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 226–246. Springer, Heidelberg (2003)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G., Aucsmith, D.: Attacks on Copyright Marking Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998)
Petitcolas, F.A.P., Anderson, R.J.: Evaluation of Copyright Marking Systems. In: IEEE Multimedia Systems, Florence, Italy (June 1999)
Ruanaidh, J.O., Petersen, H., Herrigel, A., Pereira, S., Pun, T.: Cryptographic copyright protection for digital images based on watermarking techniques. Theoretical Computer Science 226, 117–142 (1999)
Wang, S.-H., Lin, Y.-P.: Wavelet Tree Quantization for Copyright Protection Watermarking. IEEE Transactions on Image Processing 13(2), 154–165 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Das, T.K., Maitra, S. (2004). Cryptanalysis of “Wavelet Tree Quantization” Watermarking Scheme. In: Sen, A., Das, N., Das, S.K., Sinha, B.P. (eds) Distributed Computing - IWDC 2004. IWDC 2004. Lecture Notes in Computer Science, vol 3326. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30536-1_26
Download citation
DOI: https://doi.org/10.1007/978-3-540-30536-1_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24076-1
Online ISBN: 978-3-540-30536-1
eBook Packages: Computer ScienceComputer Science (R0)