Advertisement

A Robust and Transparent Watermarking Method Against Block-Based Compression Attacks

  • Phi Bang Nguyen
  • Azeddine Beghdadi
  • Marie Luong
Conference paper

Abstract

In this paper, we present a new transparent and robust watermarking method against block-based compression attacks based on two perceptual models. In order to resist to block-based compression, the main idea is to embed the watermark into regions that are not or less affected by blocking effect. These auspicious regions are selected based on a spatial prediction model of blocking effect. Then, the embedding strength is optimally determined using a JND model. The combination of these two models provides more gain in robustness and transparency. Experimental results demonstrate that our proposed method achieves a good invisibility and robustness against common “signal processing” attacks, especially to JPEG compression.

Keywords

Watermarking Pyramid transform Human visual system Blocking effect prediction JND 

References

  1. 1.
    E. Koch and J. Zhao, “Toward robust and hidden image copyright labeling,” in IEEE Workshop on Nonlinear Signal and Image Processing, Greece, June 1995, pp. 452–455.Google Scholar
  2. 2.
    I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE ICIP’97, vol. 6, no. 12, pp. 1673–1687, December 1997.Google Scholar
  3. 3.
    H. J. Lee, J. H. Park, and Y. Zheng, “Digital watermarking robust against jpeg compression,” in Information Security, LNCS. 1999, vol. 1729, pp. 167–177, Springer-Verlag.Google Scholar
  4. 4.
    H-U. Seo, J-S. Sohn, B-I. Kim, T-G. Lee, S-I. Lee, and D-G. Kim, “Robust image watermarking method using discrete cosine decompostion and just noticeable distortion,” Proc. of the 23rd ITC-CSCC’ 2008, pp. 765–768.Google Scholar
  5. 5.
    J. J. Eggers and B. Girod, “Quantization effects on digital watermarks,” Signal Processing, vol. 81, pp. 239–263, February 2001.CrossRefGoogle Scholar
  6. 6.
    P. J. Burt and E. H. Adelson, “The Laplacian Pyramid as a Compact Image Code”, in IEEE Transactions on Communications, April 1983, pp. 532–540.Google Scholar
  7. 7.
    P. B. Nguyen, A. Beghdadi and M. Luong, "Robust Watermarking in DoG Scale Space Using a Multi-scale JND Model", Lecture Notes in Computer Science, vol. 5879, pp. 561–573, ISBN: 978-3-642-10466-4, Muneesawang, P.; Wu, F.; Kumazawa, I.; Roeksabutr, A.; Liao, M.; Tang, X. (Eds.), 2009CrossRefGoogle Scholar
  8. 8.
    P. B. Nguyen, A. Beghdadi, and M. Luong, “Perceptual watermarking using pyramidal JND maps”, in Proc. of 10th IEEE ISM’08, pp. 418–423, Berkeley, CA, USA (2008).Google Scholar
  9. 9.
    P. G. J. Barten, “Evaluation of Subjective Image Quality with the Square-Root Integral Method”, in Jour. of the Opt. Society of America A: Vol. 7, Issue 10, Oct. 1990, pp. 2024–2031.Google Scholar
  10. 10.
    G. E. Legge and J. M. Foley, “Contrast Masking in Human Vision”, in Jour. of the Opt. Soc. of America, 1980, pp. 1458–1471.Google Scholar
  11. 11.
    A. Chetouani, G. Mostafaoui and A. Beghdadi, “Predicting blocking effects in the spatial domain using a learning approach”, in Proc. of SIGMAP 2008, pp. 197–201, Porto, Portugal, 2008.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2013

Authors and Affiliations

  • Phi Bang Nguyen
    • 1
  • Azeddine Beghdadi
    • 1
  • Marie Luong
    • 1
  1. 1.L2TI Laboratory, Galilee InstituteUniversity Paris 13VilletaneuseFrance

Personalised recommendations