• Aucun résultat trouvé

Valumetric scaling attack Jpeg attack

N/A
N/A
Protected

Academic year: 2022

Partager "Valumetric scaling attack Jpeg attack"

Copied!
1
0
0

Texte intégral

(1)

Valumetric scaling attack Jpeg attack

Gaussian noise attack Gaussian filtering attack

Evaluation Protocol:

100 images 256×256 from BOWS-2 database.

Payload = 1 bit embedded in 64 pixels = 1024 bits.

Four competing algorithms (SSIM = 98%):

• PR-RB-DPTC (= Fast DPTC, Treillis based),

• Turbo-TCQ (Quantized based + Turbo principle),

• Hyper-Cube ( P-QIM, Quantized based),

• Multi-Hyper-Cube (Hyper-Cube with TCQ).

TCQ Practical Evaluation in the

Hyper-Cube Watermarking Framework

Marc CHAUMONT and Dalila GOUDIA

LIRMM, UMR CNRS 5506, University of Nîmes, University of Montpellier II marc.chaumont@lirmm.fr, dalila.goudia@lirmm.fr

The Hyper-Cube Watermarking Framework (P-QIM):

[P-QIM] “Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index

Modulation Watermarking,” Q. Li and I. J. Cox, IEEE TIFS’2007.

[Hyper-Cube] “Hyper-Cube Watermarking Scheme,”

M. Chaumont, D. Goudia, and W. Puech, SPIE2011.

[Turbo-TCQ] “Tatouage Robuste d’Images par Turbo TCQ,”

G. Le Guelvouit, Traitement du Signal 2009, http://www.gleguelv.org/wt/ttcq/.

[PR-RB-DPTC] “Psychovisual Rotation-based DPTC Watermarking Scheme,”

M. Chaumont, EUSIPCO’2009.

Substitution of QIM module by TCQ module:

Results and Conclusions:

Conclusion: Perspectives:

• Slightly better performances

(than Hyper-Cube) at low power attacks,

• React equally well to four representatives attacks, (average performance are better than

PR-RB-DPTC and Turbo-TCQ).

• Selection of coefficients for the embedding,

• Vectorial QIM,

• Spreading approaches,

• Better management of coders/decoders,

• Other robust psychovisual metrics.

QIM soft decoding

de-inter- leaving

previous blocks

next

blocks distances

d0 d1

distances

d0 d1

Z

z

8 n

8

DCT Viterbi

decoding message X

x

n

slacksi

n

QIM

y

n Y

8

8

DCT IDCT

m coding n

(rate = 1/n)

message interleaving

EMBEDING

EXTRACTION

→ Quantized based

(use of QIM [Chen and Wornell 2001])

→ Robustness to valumetric attack

(use of RDM principle [Perez-Gonzalez et al. 2004])

→ Psychovisual masking

(use of a modified Watson Model [Watson 1993])

New quantization formulas: Trellis associated:

Viterbi algorithm is used to find the

host closest codeword (best path).

Références

Documents relatifs

We demonstrated the ability to construct network packets which will look similar to normal network traffic, pass through a typical Firewall, trigger specific attack element

Actually, Blind Source Separation algorithms really help the opponent exploiting the information leakage to disclose the secret carriers.. The article ends with experiments

Using an ontologically grounded definition of an attack surface, the framework contains algorithms to find all applicable attack vectors and compute metrics for the security and

A comprehensive attack pattern repository (CAPEC) is seamlessly integrated into our approach in order to provide analysts with practical security knowledge and assist them

Index Terms— High-rate robust watermarking scheme, Trellis Coded Quantization and watermarking joint scheme, Perceptual watermarking, Valumetric attack

The proposed method is compared to Cho’s [11] and Zhan’s [8] methods in terms of imperceptibility using MRMS as well as robustness in terms of correlation against noise

& By By using the using the Biomas Biomas multi multi - - agent system to agent system to s s imulate imulate transfers at territorial scale transfers at territorial

For that second step, we simulate the fault injection by debugging with GDB the optimized round 3 ARM64 implementation of SIKE [14] with curve p434 (non compressed version) using