An adversary who knows a watermarking scheme can extract the watermarked coefficients and attack them directly. This situation can be understood in a similar way to jamming as known from military communications and system performance can be described in terms of channel capacity and distortion. Using a gradient method, the attack is optimized from the adversary's viewpoint by minimizing channel capacity. It turns out that then for the same level of distortion and equiprobable modulation symbols binary modulation can achieve a higher channel capacity than modulation alphabets of larger size.
CITATION STYLE
Breitbach, M., & Imai, H. (1999). On channel capacity and modulation of watermarks in digital still images. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1648, pp. 125–139). Springer Verlag. https://doi.org/10.1007/3-540-48390-x_10
Mendeley helps you to discover research relevant for your work.