QIM watermarking games

Anil Kumar Goteti, Pierre Moulin

Research output: Contribution to journalConference article

Abstract

Quantization Index Modulation (QIM) methods are widely used for blind data embedding and watermarking. Given a QIM watermarking code, we ask what is the attacker's noise distribution that maximizes probability of error of the detector. For memoryless attacks, the problem is reduced to a convex programming problem. Next, we derive QIM code parameters that are minmax optimal.

Original languageEnglish (US)
Pages (from-to)717-720
Number of pages4
JournalProceedings - International Conference on Image Processing, ICIP
Volume5
StatePublished - Dec 1 2004
Event2004 International Conference on Image Processing, ICIP 2004 - , Singapore
Duration: Oct 18 2004Oct 21 2004

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'QIM watermarking games'. Together they form a unique fingerprint.

  • Cite this