Paper
22 June 2004 Capacity of data-hiding system subject to desynchronization
Author Affiliations +
Abstract
Data hiding has been mainly studied in the last years. Many applications are targeted such as copy-rights management, meta-data embedding for rich-media applications, ... In all these applications, it is crucial to estimate what is the capacity of data hiding. Many works have then been made to study watermarking performance considering data-hiding as a kind of channel communication. However in all these studies, an assumption is made about the perfect knowledge of all attacks parameters (may be known in advance or later estimated with attacks modeling). More especially a malicious attacker may biased its attack so that parameters estimation may not be perfect (desynchronization in parameters). Furthermore, random geometrical attacks for images such as proposed by Stirmark benchmark (more generally desynchronization attacks) show that perfect synchronization may not also be achievable. These last kind of attacks are actually the most effective and lack of theoretical modeling for capacity estimation. We then propose a new model for taking into account desynchronization phenomenon in data hiding (coupled with degrading attacks - i.e. optimal SAWGN attacks). Further, thanks to the use of game theory, we state bounds on the capacity that may be obtained by data hiding systems when subject to desynchronization.
© (2004) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Stephane Pateux, Gaetan Le Guelvouit, and Jonathan Delhumeau "Capacity of data-hiding system subject to desynchronization", Proc. SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, (22 June 2004); https://doi.org/10.1117/12.525786
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Distortion

Data hiding

Discrete wavelet transforms

Interference (communication)

Performance modeling

Systems modeling

RELATED CONTENT

Vertical MTF measurements
Proceedings of SPIE (August 31 1993)
R/D optimal data hiding
Proceedings of SPIE (April 09 1999)

Back to Top