Nested object watermarking: transparency and capacity evaluation

被引:0
|
作者
Vielhauer, Claus [1 ]
Schott, Maik [1 ]
Kraetzer, Christian [1 ]
Dittmann, Jana [1 ]
机构
[1] Univ Magdeburg, Dept Comp Sci, D-39106 Magdeburg, Germany
来源
SECURITY, FORENSICS, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS X | 2008年 / 6819卷
关键词
watermarking; image processing; hierarchical objects; hierarchical trees; protocol; synchronization;
D O I
10.1117/12.766370
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Annotation watermarking (also called caption or illustration watermarking) is a specific application of image watermarking, where supplementary information is embedded directly in the media, linking it to media content, whereby it is not get separated from the media by non-malicious processing steps like image cropping or non-lossy compression. Nested object annotation watermarking (NOAWM) was recently introduced as a specialization within annotation watermarking, for embedding hierarchical object relations in photographic images. In earlier work, several techniques for NOAWM have been suggested and have shown some domain-specific problems with respect to transparency (i.e. preciseness of annotation regions) and robustness (i.e. synchronization problems due to high density, multiple watermarking), which is addressed in this paper. A first contribution of this paper is therefore proposed a theoretical framework to characterize requirements and properties of previous art and suggest a classification of known NOAWM schemes. The second aspect is the study of one specific transparency aspect, the preciseness of the spatial annotations preserved by NOAWM schemes, based on a new area-based quality measurement. Finally, the synchronization problems reported from earlier works is addressed. One possible solution is to use content-specific features of the image to support synchronization. We discuss various theoretical approaches based on for example visual hashes and image contouring and present experimental results.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Nested object watermarking: Comparison of block-luminance and blue channel LSB Wet Paper Code image watermarking
    Vielhauer, Claus
    Dittmann, Jana
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505
  • [2] Nested Object Watermarking: From the Rectangular Constraint to Polygonal and Private Annotations
    Vielhauer, Claus
    Schott, Maik
    MM&SEC'07: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2007, 2007, : 187 - 193
  • [3] Watermarking for Data Provenance in Object Detection
    Snarski, Anna
    Dimon, Walker L.
    Manville, Keith
    Krumdick, Michael
    2022 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP, AIPR, 2022,
  • [4] Robust high capacity watermarking based on DCT and spread spectrum
    Charkari, Nasrollah Moghaddam
    Chahooki, Mohammad Ali Zare
    2007 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, VOLS 1-3, 2007, : 457 - 460
  • [5] A computer aided visual model for ensuring video watermarking transparency
    Dittmann, J
    Mukherjee, A
    Steinebach, M
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 45 - 54
  • [6] High capacity reversible watermarking for audio
    van der Veen, M
    Bruekers, F
    van Leest, A
    Cavin, S
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 1 - 11
  • [7] On the capacity game of public watermarking systems
    Somekh-Baruch, A
    Merhav, N
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (03) : 511 - 524
  • [8] Evaluation Tool For Generating Attacks on Watermarking Algorithms
    Al-Gindy, Ahmed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (06): : 27 - 33
  • [9] Watermarking capacity control for dynamic payload embedding
    Nyeem, Hussain
    Boles, Wageeh
    Boyd, Colin
    Advances in Intelligent Systems and Computing, 2015, 361 : 143 - 152
  • [10] Novel object based robust video watermarking scheme
    Fu, Yong-Gang
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 1705 - 1710