Abstract
Watermarking in the Joint Photographic Experts Group (JPEG)2000 coding pipeline is investigated in this paper. A joint quantization and watermarking method based on trellis-coded quantization (TCQ) is proposed to reliably embed data during the quantization stage of the JPEG2000 part 2 codec. The central contribution of this work is the use of a single quantization module to jointly perform quantization and watermark embedding at the same time. The TCQ-based watermarking technique allows embedding the watermark in the detail sub-bands of one or more resolution levels except the first one. Watermark recovery is performed after image decompression. The performance of this joint scheme in terms of image quality and robustness against common image attacks was estimated on real images.
Similar content being viewed by others
Notes
Horizontal and vertical low frequency sub-band.
Horizontal high-frequency and vertical low-frequency sub-band.
Horizontal low-frequency and vertical high-frequency sub-band
Horizontal high-frequency and vertical high-frequency sub-band.
Shuchman [23] showed that the subtractive dithered quantization error does not depend on the quantizer input when the dither signal d has a uniform distribution within the range of one quantization bin (\({\it d} \in [-\Delta/2,\Delta/2]\)) leading to an expected squared error of E 2 = Δ2/12.
The openjpeg library is available for download at http://www.openjpeg.org.
SSIM is a perceptual measure exploiting human visual system properties. The SSIM values are real positive numbers lower or equal to 1. Stronger is the degradation and lower is the SSIM measure.
These images are from the BOWS2 database which is located at http://bows2.gipsa-lab.inpg.fr.
References
Chen B, Wornell G (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47:1423–1443
Eggers JJ, Bäuml R, Tzschoppe R, Girod B (2003) Scalar costa scheme for information embedding. IEEE Trans Signal Process 51:1003–1019
Miller ML, Doerr GJ, Cox IJ (2004) Applying informed coding and informed embedding to design a robust, high capacity watermark. IEEE Trans Signal Process 13(6):792–807
Taubman DS, Marcellin MW (2002) JPEG2000 image compression fundamentals standards and practice. Kluwer Academic, Boston
ISO/IEC JTCI/SC29 WG1 (2000) JPEG2000 part II final committee draft version 1.0
Costa M (1983) Writing on dirty paper. IEEE Trans Inf Theory 29:439–441
Dufaux F, Wee S, Apostolopoulos J, Ebrahimi T (2004) JPSEC for secure imaging in JPEG2000. SPIE application of digital image processing, Proc. SPIE. San Jose, USA, pp 319–330
Fan Y-C, Tsao HW (2007) A dual pyramid watermarking for JPEG2000. Int J High Perform Comput Netw 5:84–96
Fan YC, Chiang A, Shen JH (2008) ROI-based watermarking scheme for JPEG 2000. J Circuits Syst Signal Process 27(5):763–774
Li K, Zhang X-P (2003) Reliable adaptive watermarking scheme integrated with JPEG2000. International Symposium on Image and Signal Processing and Analysis (ISPA), Proc. ISPA 2003, vol 1. Rome, Italy, pp 117–122
Meerwald P (2001) Quantization watermarking in the JPEG2000 coding pipeline. 5th joint working conference on communications and multimedia security, communications and multimedia security issues of the new century, Proc. IFIP TC6/TC11. Darmstadt, Germany, pp 69–79
Schlauweg M, Profrock D, Muller E (2006) JPEG2000-based secure image authentication. 8th ACM Multimedia and Security Workshop, Proc. MM&Sec 2006. Geneva, Switzerland, pp 62–67
Ouled-Zaid A, Makhloufi A, Olivier C (2009) Improved QIM-based watermarking integrated to JPEG2000 coding scheme. J Signal Image Video Process 3:197–207
Marcellin MW, Fischer TR (1990) Trellis coded quantization of memoryless and Gauss–Markov source. IEEE Trans Commun 38:82–93
Forney GD Jr (1973) The Viterbi algorithm. IEEE Trans Inf Theory 61:268–278
Braci S, Boyer R, Delpha C (2009) Security evaluation of informed watermarking schemes. 16th IEEE international conference on image processing (ICIP), Proc. ICIP 2009. Cairo, Egypt, pp 117–120
Ouled Zaid A, Makhloufi A, Bouallegue A (2007) Wavelet domain watermark embedding strategy using TTCQ quantization. Int J Comput Sci Netw Secur (IJCSNS) 7(6):165–170
Le-Guelvouit G (2005) Trellis-coded quantization for public-key watermarking. IEEE international conference on acoustics, speech and signal processing (ICASSP 2005), see the website http://www.gleguelv.org/pub/index.html
Chou J, Pradhan SS, Ramchandran K (1999) On the duality between data hiding and distributed source coding. Annual Asilomar conference on signals systems and computers, Proc. AACSSC 1999, vol 2. Pacific Grove, USA, pp 1503–1507
Esen E, Alatan AA (2004) Data hiding using trellis coded quantization. IEEE international conference on image processing (ICIP), Proc. ICIP 2004, vol 1. Singapore, pp 59–62
Wang X, Zhang X-P (2007) Generalized trellis coded quantization for data hiding. IEEE international conference on acoustics, speech and signal processing (ICASSP), Proc. ICASSP 2007, vol 2. Honolulu, Hawaii, USA, pp 269–272
Fischer TR, Wang M (1992) Entropy-constrained trellis-coded quantization. IEEE Trans Inf Theory 38:415–426
Schuchman L (1994) Dither signals and their effect on quantization noise. IEEE Trans Commun Technol (COM) 12:162–165
Pérez-Freire L, Pérez-Gonzalez F (2008) Security of Lattice-based data hiding against the watermarked-only attack. IEEE Trans Inf Forensics Security 3(4):593–610
Cayre F, Fontaine C, Furon T (2005) Watermarking security: theory and practice. IEEE Trans Signal Process, Special Issue on Content Protection 53:3976–3987
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Goudia, D., Chaumont, M., Puech, W. et al. Joint trellis-coded quantization watermarking for JPEG2000 images. Ann. Telecommun. 67, 407–421 (2012). https://doi.org/10.1007/s12243-011-0280-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-011-0280-9