Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Bhowmik, Deepayan; Abhayaratne, Charith (2014)
Publisher: Springer Verlag
Languages: English
Types: Article
With the emergence of new scalable coding standards, such as JPEG2000, multimedia is stored as scalable coded bit streams that may be adapted to cater network, device and usage preferences in multimedia usage chains providing universal multimedia access. These adaptations include quality, resolution, frame rate and region of interest scalability and achieved by discarding least significant parts of the bit stream according to the scalability criteria. Such content adaptations may also affect the content protection data, such as watermarks, hidden in the original content. Many wavelet-based robust watermarking techniques robust to such JPEG2000 compression attacks are proposed in the literature. In this paper, we have categorized and evaluated the robustness of such wavelet-based image watermarking techniques against JPEG2000 compression, in terms of algorithmic choices, wavelet kernel selection, subband selection, or watermark selection using a new modular framework. As most of the algorithms use a different set of parametric combination, this analysis is particularly useful to understand the effect of various parameters on the robustness under a common platform and helpful to design any such new algorithm. The analysis also considers the imperceptibility performance of the watermark embedding, as robustness and imperceptibility are two main watermarking properties, complementary to each other.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • 1. D. S. Taubman and M. W. Marcellin, JPEG2000 Image Compression Fundamentals, Standards and Practice. USA: Springer, 2002.
    • 2. H. Schwarz, D. Marpe, and T. Wiegand, “Overview of the scalable video coding extension of the H.264/AVC standard,” IEEE Trans. Circ. and Syst. for Video Tech, vol. 17, no. 9, pp. 1103-1120, Sept. 2007.
    • 3. S. Kandadai and C. D. Creusere, “Scalable audio compression at low bitrates,” IEEE Trans. Audio, Speech, and Language Processing, vol. 16, no. 5, pp. 969-979, July 2008.
    • 4. I. Burnett, R. V. de Walle, K. Hill, J. Bormans, and F. Pereira, “MPEG-21: goals and achievements,” IEEE Multimedia, vol. 10, no. 4, pp. 60-70, Oct.-Dec. 2003.
    • 5. A. Vetro, “MPEG-21 digital item adaptation: enabling universal multimedia access,” IEEE Multimedia, vol. 11, no. 1, pp. 84-87, Jan.-March 2004.
    • 6. L. Xie and G. R. Arce, “Joint wavelet compression and authentication watermarking,” in Proc. IEEE ICIP, vol. 2, 1998, pp. 427-431.
    • 7. F. Huo and X. Gao, “A wavelet based image watermarking scheme,” in Proc. IEEE ICIP, 2006, pp. 2573-2576.
    • 8. H. Tao, J. Liu, and J. Tian, “Digital watermarking technique based on integer Harr transforms and visual properties,” in Proc. SPIE Image Compression and Encryption Tech., vol. 4551-1, 2001, pp. 239-244.
    • 9. X. Xia, C. G. Boncelet, and G. R. Arce, “Wavelet transform based watermark for digital images,” Optic Express, vol. 3, no. 12, pp. 497-511, Dec. 1998.
    • 10. G. Al-Hudhud, “Adaptation of HVS Sensitivity for Perceptual Modelling of Wavelet-Based Image Compression,” in Proc. Second Int'l Conf. in Visualisation, 2009, pp. 196-200.
    • 11. X. C. Feng and Y. Yang, “A new watermarking method based on DWT,” in Proc. Int'l Conf. on Computational Intelligence and Security, Lect. Notes in Comp. Sci. (LNCS), vol. 3802, 2005, pp. 1122-1126.
    • 12. Q. Gong and H. Shen, “Toward blind logo watermarking in JPEG-compressed images,” in Proc. Int'l Conf. on Parallel and Distributed Comp., Appl. and Tech., (PDCAT), 2005, pp. 1058-1062.
    • 13. M. Barni, F. Bartolini, and A. Piva, “Improved wavelet-based watermarking through pixelwise masking,” IEEE Trans. Image Processing, vol. 10, no. 5, pp. 783-791, May 2001.
    • 14. D. Kundur and D. Hatzinakos, “Toward robust logo watermarking using multiresolution image fusion principles,” IEEE Trans. Multimedia, vol. 6, no. 1, pp. 185-198, Feb. 2004.
    • 15. G. Bhatnagar and Q.M. J. Wuand B. Raman, “Robust gray-scale logo watermarking in wavelet domain,” Computers & Electrical Engineering, 2012.
    • 16. M. R. Soheili, “Blind Wavelet Based Logo Watermarking Resisting to Cropping,” in Proc. 20th International Conference on Pattern Recognition, 2010, pp. 1449-1452.
    • 17. D. Kundur and D. Hatzinakos, “Digital watermarking using multiresolution wavelet decomposition,” in Proc. IEEE ICASSP, vol. 5, 1998, pp. 2969-2972.
    • 18. P. Campisi, A. Neri, and M. Visconti, “Wavelet-based method for high-frequency subband watermark embedding,” in Proc. SPIE Multimedia Sys. and Appl. III, vol. 4209, 2001, pp. 344-353.
    • 19. C. Jin and J. Peng, “A robust wavelet-based blind digital watermarking algorithm,” Information Technology Journal, vol. 5, no. 2, pp. 358-363, 2006.
    • 20. P. Meerwald and A. Uhl, “A survey of wavelet-domain watermarking algorithms,” in Proc. SPIE Security and Watermarking of Multimedia Contents III, vol. 4314, 2001, pp. 505- 516.
    • 21. C.-Y. Yang, W.-Y. Hwang, and Y.-F. Cheng, “IWT-Based Watermarking By Adaptive BitLabeling Scheme,” in Proc Int'l Conf. on Intelligent Information Hiding and Multimedia Signal Processing, 2008, pp. 1165-1168.
    • 22. Z. Zhang and Y. L. Mo, “Embedding strategy of image watermarking in wavelet transform domain,” in Proc. SPIE Image Compression and Encryption Tech., vol. 4551-1, 2001, pp. 127-131.
    • 23. J. R. Kim and Y. S. Moon, “A robust wavelet-based digital watermarking using leveladaptive thresholding,” in Proc. IEEE ICIP, vol. 2, 1999, pp. 226-230.
    • 24. S. Marusic, D. B. H. Tay, G. Deng, and P. Marimuthu, “A study of biorthogonal wavelets in digital watermarking,” in Proc. IEEE ICIP, vol. 3, Sept. 2003, pp. II-463-6.
    • 25. T.-S. Chen, J. Chen, and J.-G. Chen, “A simple and efficient watermarking technique based on JPEG2000 codec,” in Proc. Int'l Symp. on Multimedia Software Eng., 2003, pp. 80-87.
    • 26. P. Meerwald, “Quantization watermarking in the JPEG2000 coding pipeline,” in Proc. Int'l Working Conf. on Comms. and Multimedia Security, 2001, pp. 69-79.
    • 27. Q. Sun and S. Chang, “A secure and robust digital signature scheme for JPEG2000 image authentication,” IEEE Trans. Multimedia, vol. 7, no. 3, pp. 480-494, June 2005.
    • 28. F. Dufaux, S. J. Wee, J. G. Apostolopoulos, and T. Ebrahimi, “JPSEC for secure imaging in JPEG2000,” in Proc. SPIE Appl. of Digital Image Processing XXVII, vol. 5558-1, 2004, pp. 319-330.
    • 29. L. Chunhua and F. Li, “Adaptive image watermarking algorithm based on biorthogonal wavelet transform,” in Proc Int'l Conf. on E-Business and E-Government (ICEE), 2011, pp. 1-4.
    • 30. R. Grosbois, P. Gerbelot, and T. Ebrahimi, “Authentication and access control in the JPEG2000 compressed domain,” in Proc. SPIE Appl. of Digital Image Processing XXIV, vol. 4472-1, 2001, pp. 95-104.
    • 31. Y.-S. Seo, M.-S. Kim, H.-J. Park, H.-Y. Jung, H.-Y. Chung, Y. Huh, and J.-D. Lee, “A secure watermarking for JPEG2000,” in Proc. IEEE ICIP, vol. 2, 2001, pp. 530-533.
    • 32. M. A. Suhail, M. S. Obaidat, S. S. Ipson, and B. Sadoun, “A comparative study of digital watermarking in JPEG and JPEG2000 environments,” Information Sciences, vol. 151, pp. 93-105, 2003.
    • 33. D. Bhowmik and C. Abhayaratne, “Morphological wavelet domain image watermarking,” in Proc. European Signal Processing Conference (EUSIPCO), 2007, pp. 2539-2543.
    • 34. C. Abhayaratne and D. Bhowmik, “Scalable watermark extraction for real-time authentication of JPEG2000 images,” Journal of Real-Time Image Processing, vol. 6, no. 4, p. 19 pages, 2011.
    • 35. N. Sprljan, M. Mrak, G. C. K. Abhayaratne, and E. Izquierdo, “A scalable coding framework for efficient video adaptation,” in Proc. Int'l Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), 2005.
    • 36. D. Bhowmik and C. Abhayaratne, “A generalised model for distortion performance analysis of wavelet based watermarking,” in Proc. Int'l Workshop on Digital Watermarking (IWDW '08), Lect. Notes in Comp. Sci. (LNCS), vol. 5450, 2008, pp. 363-378.
    • 37. --, “Embedding distortion modeling for non-orthonormal wavelet based watermarking schemes,” in Proc. SPIE Wavelet App. in Industrial Processing VI, vol. 7248, 2009, p. 72480K (12 Pages).
    • 38. I. Daubechies and W. Sweldens, “Factoring wavelet transforms into lifting steps,” Journal of Fourier Anal. Appl., vol. 4, no. 3, pp. 245-267, 1998.
    • 39. G. C. K. Abhayaratne and H. Heijmans, “A novel morphological subband decomposition scheme for 2D+t wavelet video coding,” in Proc. Int'l Symp. on Image and Signal Processing and Analysis, vol. 1, 2003, pp. 239-244.
    • 40. F. J. Hampson and J.-C. Pesquet, “A nonlinear subband decomposition with perfect reconstruction,” in Proc. IEEE ICASSP, vol. 3, 1996, pp. 1523-1526.
    • 41. H. Heijmans and J. Goutsias, “Nonlinear multiresolution signal decomposition schemes: Part II: Morphological wavelets,” IEEE Trans. Image Processing, vol. 9, no. 11, pp. 1897- 1913, Nov. 2000.
    • 42. H. Jegou, M. Douze, and C. Schmid, “Hamming embedding and weak geometric consistency for large scale image search,” in Proc. 10th European Conference on Computer Vision: Part I (ECCV'08). Springer-Verlag, 2008, pp. 304-317.
    • 43. D. Bhowmik and C. Abhayaratne, “The effect of quality scalable image compression on robust watermarking,” in Proc. Int'l Workshop on Digital Signal Processing, 2009, pp. 1-8.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article