Nested object watermarking: transparency and capacity evaluation

被引:0
作者
Vielhauer, Claus [1 ]
Schott, Maik [1 ]
Kraetzer, Christian [1 ]
Dittmann, Jana [1 ]
机构
[1] Univ Magdeburg, Dept Comp Sci, D-39106 Magdeburg, Germany
来源
SECURITY, FORENSICS, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS X | 2008年 / 6819卷
关键词
watermarking; image processing; hierarchical objects; hierarchical trees; protocol; synchronization;
D O I
10.1117/12.766370
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Annotation watermarking (also called caption or illustration watermarking) is a specific application of image watermarking, where supplementary information is embedded directly in the media, linking it to media content, whereby it is not get separated from the media by non-malicious processing steps like image cropping or non-lossy compression. Nested object annotation watermarking (NOAWM) was recently introduced as a specialization within annotation watermarking, for embedding hierarchical object relations in photographic images. In earlier work, several techniques for NOAWM have been suggested and have shown some domain-specific problems with respect to transparency (i.e. preciseness of annotation regions) and robustness (i.e. synchronization problems due to high density, multiple watermarking), which is addressed in this paper. A first contribution of this paper is therefore proposed a theoretical framework to characterize requirements and properties of previous art and suggest a classification of known NOAWM schemes. The second aspect is the study of one specific transparency aspect, the preciseness of the spatial annotations preserved by NOAWM schemes, based on a new area-based quality measurement. Finally, the synchronization problems reported from earlier works is addressed. One possible solution is to use content-specific features of the image to support synchronization. We discuss various theoretical approaches based on for example visual hashes and image contouring and present experimental results.
引用
收藏
页数:12
相关论文
共 50 条
[31]   Real data performance evaluation of CAISS watermarking scheme [J].
Guzik, Piotr ;
Matiolanski, Andrzej ;
Dziech, Andrzej .
MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (12) :4437-4451
[32]   Vector map watermarking evaluation based on certainty factor [J].
Sun, Jianguo ;
Xia, Songzhu ;
Zhang, Guoyin .
Journal of Theoretical and Applied Information Technology, 2012, 46 (01) :67-72
[33]   Speech quality evaluation: A new application of digital watermarking [J].
Cai, Libin ;
Tu, Ronghui ;
Zhao, Jiying ;
Mao, Yongyi .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2007, 56 (01) :45-55
[34]   Real Data Performance Evaluation of CAISS Watermarking Scheme [J].
Guzik, Piotr ;
Matiolanski, Andrzej ;
Dziech, Andrzej .
MULTIMEDIA COMMUNICATIONS, SERVICES AND SECURITY, 2012, 287 :139-147
[35]   Attacks, applications and evaluation of known watermarking algorithms with Checkmark [J].
Meerwald, P ;
Pereira, S .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :293-304
[36]   Parallel color image watermarking scheme for multiple picture object based on multithreading coding [J].
Munoz-Ramirez, David O. ;
Ponomaryov, Volodymyr, I ;
Reyes-Reyes, Rogelio ;
Cruz-Ramos, Clara ;
Garcia-Salgado, Beatriz P. .
REAL-TIME IMAGE PROCESSING AND DEEP LEARNING 2020, 2020, 11401
[37]   Real data performance evaluation of CAISS watermarking scheme [J].
Piotr Guzik ;
Andrzej Matiolanski ;
Andrzej Dziech .
Multimedia Tools and Applications, 2015, 74 :4437-4451
[38]   Object based watermarking for H.264/AVC video resistant to rst attacks [J].
Gaj, Sibaji ;
Patel, Ashish Singh ;
Sur, Arijit .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (06) :3053-3080
[39]   Object based watermarking for H.264/AVC video resistant to rst attacks [J].
Sibaji Gaj ;
Ashish Singh Patel ;
Arijit Sur .
Multimedia Tools and Applications, 2016, 75 :3053-3080
[40]   Novel technique for capacity maximizing in digital watermarking using fuzzy rule base [J].
Naseem, Muhammad Tahir ;
Qureshi, Ijaz Mansoor ;
Atta-ur-Rahman ;
Muzaffar, Muhammad Zeeshan .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2014, 27 (05) :2497-2509