Empirical evaluation of a JPEG2000 standard-based robust watermarking scheme

被引:4
作者
Minguillón, J [1 ]
Joancomartí, JH [1 ]
Megías, D [1 ]
机构
[1] Univ Oberta Catalunya, E-08035 Barcelona, Catalonia, Spain
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V | 2003年 / 5020卷
关键词
image watermarking; lossy compression; JPEG2000; standard;
D O I
10.1117/12.476811
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper an empirical evaluation of the lossy compression properties of the JPEG2000 standard for watermarking purposes is performed. The JPEG2000 standard is used as a basic tool for determining both how and where the embedded watermark should be placed in the image. The original image is slightly modified in order to generate a similar image (indistinguishable by the observer), and the mark is embedded in the pixels presenting differences between both images. Previous experiments show that the properties of the resulting watermarking scheme depend strongly on the transformation stage characteristics of the lossy image compression system. Several parameters related to the JPEG2000 standard are tested, in addition to the compression ratio: the wavelet transform, block size, and the number of levels of decomposition for each block. These parameters affect not only the capacity but also the robustness of the watermarking scheme: the number of different pixels between the original image and the slightly modified one, and the distribution of such differences. For evaluation purposes we use the Stirmark benchmark. We compare the impact on system performance of each one of the JPEG2000 standard parameters, for several kinds of attacks, namely filtering (including sharpening), JPEG lossy compression, cropping, row and column removal, and a combination of rotation, cropping and scaling.
引用
收藏
页码:717 / 727
页数:11
相关论文
共 21 条
[1]  
ADAMS MD, 2002, JASPER JPEG 2000 ENC
[2]   Frequency mode LR attack operator for digitally watermarked images [J].
Barnett, R ;
Pearson, DE .
ELECTRONICS LETTERS, 1998, 34 (19) :1837-1839
[3]   The dynamic digital disk [J].
Bell, AE .
IEEE SPECTRUM, 1999, 36 (10) :28-35
[4]  
Boneh D, 1995, LECT NOTES COMPUT SC, V963, P452
[5]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[6]   Short collusion-secure fingerprints based on dual binary Hamming codes [J].
Domingo-Ferrer, J ;
Herrera-Joancomartí, J .
ELECTRONICS LETTERS, 2000, 36 (20) :1697-1699
[7]  
Domingo-Ferrer J., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P128, DOI 10.1109/ITCC.2000.844195
[8]  
Koch E., 1995, P IEEE WORKSH NONL S, P452
[9]  
LANE TG, 1997, INDEPEDENT JPEG GROU
[10]  
Lee HJ, 1999, LECT NOTES COMPUT SC, V1729, P167