Skip to main content
Log in

Joint trellis-coded quantization watermarking for JPEG2000 images

  • Published:
annals of telecommunications - annales des télécommunications Aims and scope Submit manuscript

Abstract

Watermarking in the Joint Photographic Experts Group (JPEG)2000 coding pipeline is investigated in this paper. A joint quantization and watermarking method based on trellis-coded quantization (TCQ) is proposed to reliably embed data during the quantization stage of the JPEG2000 part 2 codec. The central contribution of this work is the use of a single quantization module to jointly perform quantization and watermark embedding at the same time. The TCQ-based watermarking technique allows embedding the watermark in the detail sub-bands of one or more resolution levels except the first one. Watermark recovery is performed after image decompression. The performance of this joint scheme in terms of image quality and robustness against common image attacks was estimated on real images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Notes

  1. Horizontal and vertical low frequency sub-band.

  2. Horizontal high-frequency and vertical low-frequency sub-band.

  3. Horizontal low-frequency and vertical high-frequency sub-band

  4. Horizontal high-frequency and vertical high-frequency sub-band.

  5. Shuchman [23] showed that the subtractive dithered quantization error does not depend on the quantizer input when the dither signal d has a uniform distribution within the range of one quantization bin (\({\it d} \in [-\Delta/2,\Delta/2]\)) leading to an expected squared error of E 2 = Δ2/12.

  6. The openjpeg library is available for download at http://www.openjpeg.org.

  7. SSIM is a perceptual measure exploiting human visual system properties. The SSIM values are real positive numbers lower or equal to 1. Stronger is the degradation and lower is the SSIM measure.

  8. These images are from the BOWS2 database which is located at http://bows2.gipsa-lab.inpg.fr.

References

  1. Chen B, Wornell G (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47:1423–1443

    Article  MathSciNet  MATH  Google Scholar 

  2. Eggers JJ, Bäuml R, Tzschoppe R, Girod B (2003) Scalar costa scheme for information embedding. IEEE Trans Signal Process 51:1003–1019

    Article  MathSciNet  Google Scholar 

  3. Miller ML, Doerr GJ, Cox IJ (2004) Applying informed coding and informed embedding to design a robust, high capacity watermark. IEEE Trans Signal Process 13(6):792–807

    Google Scholar 

  4. Taubman DS, Marcellin MW (2002) JPEG2000 image compression fundamentals standards and practice. Kluwer Academic, Boston

    Book  Google Scholar 

  5. ISO/IEC JTCI/SC29 WG1 (2000) JPEG2000 part II final committee draft version 1.0

  6. Costa M (1983) Writing on dirty paper. IEEE Trans Inf Theory 29:439–441

    Article  MATH  Google Scholar 

  7. Dufaux F, Wee S, Apostolopoulos J, Ebrahimi T (2004) JPSEC for secure imaging in JPEG2000. SPIE application of digital image processing, Proc. SPIE. San Jose, USA, pp 319–330

  8. Fan Y-C, Tsao HW (2007) A dual pyramid watermarking for JPEG2000. Int J High Perform Comput Netw 5:84–96

    Article  Google Scholar 

  9. Fan YC, Chiang A, Shen JH (2008) ROI-based watermarking scheme for JPEG 2000. J Circuits Syst Signal Process 27(5):763–774

    Article  MathSciNet  Google Scholar 

  10. Li K, Zhang X-P (2003) Reliable adaptive watermarking scheme integrated with JPEG2000. International Symposium on Image and Signal Processing and Analysis (ISPA), Proc. ISPA 2003, vol 1. Rome, Italy, pp 117–122

  11. Meerwald P (2001) Quantization watermarking in the JPEG2000 coding pipeline. 5th joint working conference on communications and multimedia security, communications and multimedia security issues of the new century, Proc. IFIP TC6/TC11. Darmstadt, Germany, pp 69–79

  12. Schlauweg M, Profrock D, Muller E (2006) JPEG2000-based secure image authentication. 8th ACM Multimedia and Security Workshop, Proc. MM&Sec 2006. Geneva, Switzerland, pp 62–67

  13. Ouled-Zaid A, Makhloufi A, Olivier C (2009) Improved QIM-based watermarking integrated to JPEG2000 coding scheme. J Signal Image Video Process 3:197–207

    Article  Google Scholar 

  14. Marcellin MW, Fischer TR (1990) Trellis coded quantization of memoryless and Gauss–Markov source. IEEE Trans Commun 38:82–93

    Article  MathSciNet  Google Scholar 

  15. Forney GD Jr (1973) The Viterbi algorithm. IEEE Trans Inf Theory 61:268–278

    MathSciNet  Google Scholar 

  16. Braci S, Boyer R, Delpha C (2009) Security evaluation of informed watermarking schemes. 16th IEEE international conference on image processing (ICIP), Proc. ICIP 2009. Cairo, Egypt, pp 117–120

  17. Ouled Zaid A, Makhloufi A, Bouallegue A (2007) Wavelet domain watermark embedding strategy using TTCQ quantization. Int J Comput Sci Netw Secur (IJCSNS) 7(6):165–170

    Google Scholar 

  18. Le-Guelvouit G (2005) Trellis-coded quantization for public-key watermarking. IEEE international conference on acoustics, speech and signal processing (ICASSP 2005), see the website http://www.gleguelv.org/pub/index.html

  19. Chou J, Pradhan SS, Ramchandran K (1999) On the duality between data hiding and distributed source coding. Annual Asilomar conference on signals systems and computers, Proc. AACSSC 1999, vol 2. Pacific Grove, USA, pp 1503–1507

  20. Esen E, Alatan AA (2004) Data hiding using trellis coded quantization. IEEE international conference on image processing (ICIP), Proc. ICIP 2004, vol 1. Singapore, pp 59–62

  21. Wang X, Zhang X-P (2007) Generalized trellis coded quantization for data hiding. IEEE international conference on acoustics, speech and signal processing (ICASSP), Proc. ICASSP 2007, vol 2. Honolulu, Hawaii, USA, pp 269–272

  22. Fischer TR, Wang M (1992) Entropy-constrained trellis-coded quantization. IEEE Trans Inf Theory 38:415–426

    Article  MATH  Google Scholar 

  23. Schuchman L (1994) Dither signals and their effect on quantization noise. IEEE Trans Commun Technol (COM) 12:162–165

    Article  Google Scholar 

  24. Pérez-Freire L, Pérez-Gonzalez F (2008) Security of Lattice-based data hiding against the watermarked-only attack. IEEE Trans Inf Forensics Security 3(4):593–610

    Article  Google Scholar 

  25. Cayre F, Fontaine C, Furon T (2005) Watermarking security: theory and practice. IEEE Trans Signal Process, Special Issue on Content Protection 53:3976–3987

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dalila Goudia.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Goudia, D., Chaumont, M., Puech, W. et al. Joint trellis-coded quantization watermarking for JPEG2000 images. Ann. Telecommun. 67, 407–421 (2012). https://doi.org/10.1007/s12243-011-0280-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-011-0280-9

Keywords

Navigation