Skip to main content

Scalability Evaluation of Blind Spread-Spectrum Image Watermarking

  • Conference paper
Digital Watermarking (IWDW 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5450))

Included in the following conference series:

Abstract

In this paper, we investigate the scalability aspect of blind watermark detection under combined quality and resolution adaptation of JPEG2000 and JPEG coded bitstreams. We develop two multi-channel watermarking schemes with blind detection, based on additive spread-spectrum watermarking: one employs the DCT domain, the other the DWT domain. We obtain watermark scalability by combining detection results from multiple channels modeled by Generalized Gaussian distributions. Both schemes achieve incremental improvement of detection reliability as more data of a scalable bitstream becomes available.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I.J., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, San Francisco (2007)

    Google Scholar 

  2. Uhl, A., Pommer, A.: Image and Video Encryption. In: From Digital Rights Management to Secured Personal Communication. Advances in Information Security, vol. 15, Springer, Heidelberg (2005)

    Google Scholar 

  3. ISO/IEC 15444-1: Information technology – JPEG2000 image coding system, Part 1: Core coding system (December 2000)

    Google Scholar 

  4. ISO 10918-1/ITU-T T.81: Digital compression and coding of continuous-tone still images (September 1992)

    Google Scholar 

  5. Lin, E.T., Podilchuk, C.I., Kalker, T., Delp, E.J.: Streaming video and rate scalable compression: what are the challenges for watermarking? Journal of Electronic Imaging 13(1), 198–208 (2004)

    Article  Google Scholar 

  6. Piper, A., Safavi-Naini, R., Mertins, A.: Coefficient selection method for scalable spread spectrum watermarking. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 235–246. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. In: Proceedings of the IEEE International Conference on Image Processing, ICIP 1997, Santa Barbara, USA, October 1997, pp. 1673–1687 (1997)

    Google Scholar 

  8. Piper, A., Safavi-Naini, R., Mertins, A.: Resolution and quality scalable spread spectrum image watermarking. In: Proceeding of the 7th Workshop on Multimedia and Security, MMSEC 2005, New York, USA, August 2005, pp. 79–90 (2005)

    Google Scholar 

  9. Bae, T.M., Kang, S.J., Ro, Y.M.: Watermarking system for QoS aware content adaptation. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 77–88. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Voloshynovskiy, S., Deguillaume, F., Pun, T.: Optimal adaptive diversity watermarking with state channel estimation. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, San Jose, USA, January 2001, vol. 4314 (2001)

    Google Scholar 

  11. Zeng, W., Land, J., Zhuang, X.: Security architectures and analysis for content adaptation. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, USA, January 2005, pp. 84–95 (2005)

    Google Scholar 

  12. Lu, W., Safavi-Naini, R., Uehara, T., Li, W.: A scalable and oblivious digital watermarking for images. In: Proceedings of the International Conference on Signal Processing, ICSP 2004, August 2004, pp. 2338–2341 (2004)

    Google Scholar 

  13. Chen, T.P.C., Chen, T.: Progressive image watermarking. In: Proceedings of the IEEE International Conference on Multimedia and Expo, ICME 2000, New York, USA, July 2000, pp. 1025–1028 (2000)

    Google Scholar 

  14. Biswal, B.B., Ramakrishnan, K.R., Srinivasan, S.H.: Progressive watermarking of digital images. In: Proceedings of the IEEE Pacific-Rim Conference on Multimedia, Beijing, China (October 2001)

    Google Scholar 

  15. Tefas, A., Pitas, I.: Robust spatial image watermarking using progressive detection. In: Proceedings of the International Conference on Acoustics, Speech and Signal Processing, ICASSP 2001, Salt Lake City, USA, May 2001, pp. 1973–1976 (2001)

    Google Scholar 

  16. Seo, J.H., Park, H.B.: Data protection of multimedia contents using scalable digital watermarking. In: Proceedings of the 4th ACIS International Conference on Information Science, Sydney, Australia, July 2005, pp. 376–380 (2005)

    Google Scholar 

  17. Chandramouli, R., Memon, N.D.: On sequential watermark detection. IEEE Transactions on Signal Processing 51(4), 1034–1044 (2003)

    Article  MathSciNet  Google Scholar 

  18. Hernández, J., Amado, M., Pérez-González, F.: DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on Image Processing 9(1), 55–68 (2000)

    Article  Google Scholar 

  19. Birney, K., Fischer, T.: On the modeling of DCT and subband image data for compression. IEEE Transactions on Image Processing 4(2), 186–193 (1995)

    Article  Google Scholar 

  20. Abramowitz, M., Stegun, I.: Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. Dover, New York (1964)

    MATH  Google Scholar 

  21. Xia, X.G., Boncelet, C.G., Arce, G.R.: Wavelet transform based watermark for digital images. Optics Express 3(12), 497 (1998)

    Article  Google Scholar 

  22. Su, P.C., Kuo, C.C.: An integrated approach to image watermarking and JPEG 2000 compression. Journal of VLSI Signal Processing 27(1), 35–53 (2001)

    Article  MATH  Google Scholar 

  23. Simitopoulos, D., Boulgouris, N.V., Leontaris, A., Strintzis, M.G.: Scalable detection of perceptual watermarks in JPEG 2000 images. In: IFIP TC6/TC11 Fifth Joint Working Conference on Communications and Multimedia Security, CMS 2001, Darmstadt, Germany, pp. 93–102. Kluwer, Dordrecht (2001)

    Google Scholar 

  24. Kundur, D.: Water-filling for watermarking? In: Proceedings of the IEEE International Conference on Multimedia and Expo, ICME 2000, New York, USA, July 2000, pp. 1287–1290 (2000)

    Google Scholar 

  25. Do, M., Vetterli, M.: Wavelet-based texture retrieval using Generalized Gaussian density and Kullback-Leibler distance. IEEE Transactions on Image Processing 11(2), 146–158 (2002)

    Article  MathSciNet  Google Scholar 

  26. Wu, M., Yu, H., Gelman, A.: Multi-level data hiding for digital image and video. In: Proceedings of the SPIE, Multimedia Systems and Applications II, Boston, USA, September 1999, vol. 3845, pp. 10–21 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Meerwald, P., Uhl, A. (2009). Scalability Evaluation of Blind Spread-Spectrum Image Watermarking. In: Kim, HJ., Katzenbeisser, S., Ho, A.T.S. (eds) Digital Watermarking. IWDW 2008. Lecture Notes in Computer Science, vol 5450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04438-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04438-0_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04437-3

  • Online ISBN: 978-3-642-04438-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics