Learn More
We describe a new watermarking system based on the principles of informed coding and informed embedding. This system is capable of embedding 1380 bits of information in images with dimensions 240/spl times/368 pixels. Experiments on 2000 images indicate the watermarks are robust to significant valumetric distortions, including additive noise, low-pass(More)
Recently Zhang et al described an algorithm for the detection of ±1 LSB steganography based on the statistics of the amplitudes of local extrema in the greylevel histogram. Experimental results demonstrated performance comparable or superior to other state-of-the-art algorithms. In this paper, we describe improvements to this algorithm to (i) reduce the(More)
Watermarking digital video material is usually considered as watermarking a sequence of still images. However, such a frame-by-frame approach is very risky since straightforward embedding strategies can result in poor performance in terms of security i.e., against hostile attacks. As examples, two very common video-watermarking systems will be presented as(More)
Considerable progress has been made in the detection of steganographic algorithms based on replacement of the least significant bit (LSB) plane. However, if LSB matching, also known as -1 embedding, is used, the detection rates are considerably reduced. In particular, since LSB embedding is modeled as an additive noise process, detection is especially poor(More)
Digital watermarking was introduced at the end of the 20th century to provide means of enforcing copyright protection once the use and distribution of digital multimedia data have exploded. This technology has first been intensively investigated for still images and recent efforts have been put to exhibit unifying characteristics. On the other hand, the(More)
Benchmarking watermarking systems now goes beyond only evaluating the ability of the embedded watermark to withstand common signal primitives such as filtering, resampling, lossy compression, D/A-A/D conversions, etc. Evaluation procedures have to consider how much information leaks from a watermarking system since such knowledge could prove most helpful to(More)
Dirty paper trellis codes have been introduced as an alternative to lattice codes to implement watermarking as communications with side information. Their key feature is robustness against value-metric scaling in comparison with lattice codes. Despite the strong academic recognition, parametrization issues remain unclear. For instance, the impact of the(More)
We propose a new method to detect re-sampled imagery. The method is based on examining the normalized energy density present within windows of varying size in the second derivative of the frequency domain, and exploiting this characteristic to derive a 19-dimensional feature vector that is used to train a SVM classifier. Experimental results are reported on(More)