TY - JOUR
T1 - Robust watermarking scheme based on the JPEG2000 standard
AU - Minguillón, Julià
AU - Herrera-Joancomartí, Jordi
AU - Megías, David
N1 - Funding Information:
This work is partially supported by the Spanish MCYT and the FEDER funds under Grant No. TIC2003-08604-C04-04 MULTIMARK and by the European Commission through the IST Programme under Contract No. IST-2002-507932 ECRYPT.
Copyright:
Copyright 2013 Elsevier B.V., All rights reserved.
PY - 2005/7
Y1 - 2005/7
N2 - We perform an empirical evaluation of the lossy compression properties of the JPEG2000 standard for watermarking and fingerprinting purposes. The JPEG2000 standard is used as a basic tool for determining both how and where the embedded watermark should be placed in the image. The original image is slightly modified to generate a similar image (but indistinguishable by the observer), and the mark is embedded in the pixels presenting differences between both images. The reconstruction process uses the original and the modified images to detect the embedded mark in any possible attacked image, so the watermarking scheme is non-blind. Previous experiments show that the properties of the resulting watermarking scheme depend strongly on the transformation stage characteristics of the lossy image compression system. Several parameters related to the JPEG2000 standard are tested, in addition to the compression ratio determined by the desired bit rate: the wavelet transform, block size, and the number of levels of decomposition for each block. These parameters affect not only the capacity but also the robustness of the watermarking scheme, which depends on the number of differing pixels between the original image and the slightly modified one, and the distribution of such differences. For evaluation purposes, we use the Stirmark benchmark and the classical image corpus set for lossy image compression. We compare the impact on system performance of each of the JPEG2000 standard parameters for several kinds of attacks, namely, filtering (including sharpening); JPEG lossy compression; cropping; row and column removal; and a combination of rotation, cropping, and scaling. The false positive rate is also studied. Results show that the proposed watermarking scheme based on the JPEG2000 standard is robust against most of the classical image manipulation operation, and therefore, is suitable for watermarking purposes. Furthermore, the proposed watermarking scheme can be also upgraded to be used as a fingerprinting scheme once the embedded mark is properly coded, due to the use of a collusion scheme.
AB - We perform an empirical evaluation of the lossy compression properties of the JPEG2000 standard for watermarking and fingerprinting purposes. The JPEG2000 standard is used as a basic tool for determining both how and where the embedded watermark should be placed in the image. The original image is slightly modified to generate a similar image (but indistinguishable by the observer), and the mark is embedded in the pixels presenting differences between both images. The reconstruction process uses the original and the modified images to detect the embedded mark in any possible attacked image, so the watermarking scheme is non-blind. Previous experiments show that the properties of the resulting watermarking scheme depend strongly on the transformation stage characteristics of the lossy image compression system. Several parameters related to the JPEG2000 standard are tested, in addition to the compression ratio determined by the desired bit rate: the wavelet transform, block size, and the number of levels of decomposition for each block. These parameters affect not only the capacity but also the robustness of the watermarking scheme, which depends on the number of differing pixels between the original image and the slightly modified one, and the distribution of such differences. For evaluation purposes, we use the Stirmark benchmark and the classical image corpus set for lossy image compression. We compare the impact on system performance of each of the JPEG2000 standard parameters for several kinds of attacks, namely, filtering (including sharpening); JPEG lossy compression; cropping; row and column removal; and a combination of rotation, cropping, and scaling. The false positive rate is also studied. Results show that the proposed watermarking scheme based on the JPEG2000 standard is robust against most of the classical image manipulation operation, and therefore, is suitable for watermarking purposes. Furthermore, the proposed watermarking scheme can be also upgraded to be used as a fingerprinting scheme once the embedded mark is properly coded, due to the use of a collusion scheme.
UR - http://www.scopus.com/inward/record.url?scp=28044453507&partnerID=8YFLogxK
U2 - 10.1117/1.1988334
DO - 10.1117/1.1988334
M3 - Article
AN - SCOPUS:28044453507
VL - 14
SP - 1
EP - 16
JO - Journal of Electronic Imaging
JF - Journal of Electronic Imaging
SN - 1017-9909
IS - 3
M1 - 033015
ER -