Journal of Real-Time Image Processing

, Volume 8, Issue 3, pp 307–325 | Cite as

Scalable watermark extraction for real-time authentication of JPEG 2000 images

Special Issue

Abstract

This paper proposes a novel scalable authentication scheme that utilizes the progressive enhancement functionality in JPEG 2000 scalable image coding. The proposed method first models the wavelet-based quality scalable coding to identify the effect of the quantization and de-quantization on wavelet coefficient magnitudes and the data embedded within such coefficients as a watermark. A relationship is then established between the watermark extraction rule and the embedding rule, using the magnitudes of the reconstructed and original coefficients. It ranks the wavelet coefficients according to their ability to retain the embedded watermark data intact under various quantization levels corresponding to quality enhancements. Then watermark data is embedded into wavelet coefficients according to their rank followed by JPEG 2000 embedded coding. At the decoder as more and more quality and resolution layers are decoded the authentication metric is improved, thus resulting in gradually increasing complexity of the authentication process according to the number of quality and resolution enhancements. The low complexity authentication is available at low quality low resolution decoding, enabling real-time authentication for resource constrained applications without affecting the authentication metric. Compared to the existing methods, the proposed method results in highly robust scalable authentication of JPEG 2000 coded images.

Keywords

Scalable authentication Wavelet-based watermarking JPEG 2000 Quality scalability Watermark robustness 

Notes

Acknowledgments

The support of the UK Engineering and Physical Sciences Research Council (EPSRC) for this work is acknowledged.

References

  1. 1.
    Xie, L., Arce, G.R.: Joint wavelet compression and authentication watermarking. In: Proceedings of the IEEE ICIP, vol. 2, pp. 427–431 (1998)Google Scholar
  2. 2.
    Huo, F., Gao, X.: A wavelet based image watermarking scheme. In: Proceedings of the IEEE ICIP, pp. 2573–2576 (2006)Google Scholar
  3. 3.
    Kundur, D., Hatzinakos, D.: Digital watermarking using multiresolution wavelet decomposition. In: Proceedings of the IEEE ICASSP, vol. 5, pp. 2969–2972 (1998)Google Scholar
  4. 4.
    Jin, C., Peng, J.: A robust wavelet-based blind digital watermarking algorithm. Information Technology Journal 5(2), 358–363 (2006)CrossRefGoogle Scholar
  5. 5.
    Tao, H., Liu, J., Tian, J.: Digital watermarking technique based on integer Harr transforms and visual properties. In: Proceedings of the SPIE Image Compression and Encryption Technologies, vol. 4551, no. 1, pp. 239–244 (2001)Google Scholar
  6. 6.
    Xia, X., Boncelet, C.G., Arce, G.R.: Wavelet transform based watermark for digital images. Opt. Express 3(12), 497–511 (1998)CrossRefGoogle Scholar
  7. 7.
    Feng, X.C., Yang, Y.: A new watermarking method based on DWT. In: Proceedings of the International Conference on Computational Intelligence and Security, Lecture Notes in Computer Science (LNCS), vol. 3802, pp. 1122–1126 (2005)Google Scholar
  8. 8.
    Gong, Q., Shen, H.: Toward blind logo watermarking in JPEG-compressed images. In: Proceedings of the International Conference on Parallel and Distributed Computing, Applications and Techniques (PDCAT), pp. 1058–1062 (2005)Google Scholar
  9. 9.
    Barni, M., Bartolini, F., Piva, A.: Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. Image Process. 10(5), 783–791 (2001)MATHCrossRefGoogle Scholar
  10. 10.
    Kundur, D., Hatzinakos, D.: Toward robust logo watermarking using multiresolution image fusion principles. IEEE Trans. Multimed. 6(1), 185–198 (2004)CrossRefGoogle Scholar
  11. 11.
    Zhang, Z., Mo, Y.L.: Embedding strategy of image watermarking in wavelet transform domain. In: Proceedings of the SPIE Image Compression and Encryption Technologies, vol. 4551, no. 1, pp. 127–131 (2001)Google Scholar
  12. 12.
    Kim, J.R., Moon, Y.S.: A robust wavelet-based digital watermarking using level-adaptive thresholding. In: Proceedings of the IEEE ICIP, vol. 2, pp. 226–230 (1999)Google Scholar
  13. 13.
    Marusic, S., Tay, D.B.H., Deng, G., Marimuthu, P.: A study of biorthogonal wavelets in digital watermarking. In: Proceedings of the IEEE ICIP, vol. 3, pp. II-463–466 (2003)Google Scholar
  14. 14.
    Chen, T.-S., Chen, J., Chen, J.-G.: A simple and efficient watermarking technique based on JPEG2000 codec. In: Proceedings of the International Symposium on Multimedia Software Engineering, pp. 80–87 (2003)Google Scholar
  15. 15.
    Dufaux, F., Wee, S.J., Apostolopoulos, J.G., Ebrahimi, T.: JPSEC for secure imaging in JPEG2000. In: Proceedings of the SPIE Applications of Digital Image Processing XXVII, vol. 5558, no. 1, pp. 319–330 (2004)Google Scholar
  16. 16.
    Seo, Y.-S., Kim, M.-S., Park, H.-J., Jung, H.-Y., Chung, H.-Y., Huh, Y., Lee, J.-D.: A secure watermarking for JPEG2000. In: Proceedings of the IEEE ICIP, vol. 2, pp. 530–533 (2001)Google Scholar
  17. 17.
    Meerwald, P.: Quantization watermarking in the JPEG2000 coding pipeline. In: Proceedings of the International Working Conference on Communications and Multimedia Security, pp. 69–79 (2001)Google Scholar
  18. 18.
    Sun, Q., Chang, S.: A secure and robust digital signature scheme for JPEG2000 image authentication. IEEE Trans. Multimed. 7(3), 480–494 (2005)CrossRefGoogle Scholar
  19. 19.
    Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication and access control in the JPEG2000 compressed domain. In: Proceedings of the SPIE Applications of Digital Image Processing XXIV, vol. 4472, no. 1, pp. 95–104 (2001)Google Scholar
  20. 20.
    Suhail, M.A., Obaidat, M.S., Ipson, S.S., Sadoun, B.: A comparative study of digital watermarking in JPEG and JPEG2000 environments. Inf. Sci. 151, 93–105 (2003)MATHCrossRefGoogle Scholar
  21. 21.
    Grosbois, R., Ebrahimi, T.: Watermarking in the JPEG 2000 domain. In: Proceedings of the IEEE MMSP, pp. 339–344 (2001)Google Scholar
  22. 22.
    Taubman, D.S., Marcellin, M.W.: JPEG2000 Image Compression Fundamentals, Standards and Practice. Springer, USA (2002)CrossRefGoogle Scholar
  23. 23.
    Ebrahimi, T., Grosbois, R.: Secure JPEG 2000-JPSEC. In: Proceedings of the IEEE ICASSP, vol. 4, pp. 716–719 (2003)Google Scholar
  24. 24.
    Bhowmik, D., Abhayaratne, C.: Evaluation of watermark robustness to JPEG2000 based content adaptation attacks. In: Proceedings of the IET International Conference on Visual Information Engineering (VIE ’08), pp. 789–794 (2008)Google Scholar
  25. 25.
    Campisi, P.: Video watermarking in the 3D-DWT domain using quantization-based methods. In: Proceedings of the IEEE MMSP, pp. 1–4 (2005)Google Scholar
  26. 26.
    Meerwald, P., Uhl, A.: A survey of wavelet-domain watermarking algorithms. In: Proceedings of the SPIE Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 505–516 (2001)Google Scholar
  27. 27.
    Bhowmik, D., Abhayaratne, C.: A framework for evaluating wavelet based watermarking for scalable coded digital item adaptation attacks. In: Proceedings of the SPIE Wavelet Applications in Industrial Processing VI, vol. 7248, no. 1, pp. 72480M (2009)Google Scholar
  28. 28.
    Bhowmik, D., Abhayaratne, C.: Watermarking evaluation bench for content adaptation modes (WEBCAM). http://svc.group.shef.ac.uk/webcam.html. Accessed Jan 2010 (online)

Copyright information

© Springer-Verlag 2011

Authors and Affiliations

  1. 1.Department of Electronic and Electrical EngineeringThe University of SheffieldSheffieldUK

Personalised recommendations