A Novel Watermarking Algorithm for Image Authentication: Robustness Against Common Attacks and JPEG2000 Compression

  • Marco Aguzzi
  • Maria Grazia Albanesi
  • Marco Ferretti
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3617)


This paper presents an authentication algorithm based on robust watermarking techniques. In particular, the proposed method is based on a self – embedding scheme that is able not only to authenticate noisy images, but also to recover areas modified by a software pirate. The attack method investigated are semantic (altering the meaning of what the image is about) tampering, Gaussian white noise superposition, and JPEG2000 compression. The results are checked against the TAF function, which measure the distance between the inserted and the extracted watermark, and compared to similar algorithms in literature.


Watermark Image Wavelet Decomposition Watermark Scheme Error Pattern JPEG2000 Compression 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Benedetto, S., Biglieri, E., Castellani, V.: Digital Transmission Theory. Prentice-Hall, Inc., Englewood Cliffs (1987)zbMATHGoogle Scholar
  2. 2.
    Gallagher, R.G.: Information theory and reliable communications. John Wiley & Sons, Chichester (1968)Google Scholar
  3. 3.
    Golay, M.J.E.: Notes on digital coding. Proceedings of IEEE 37, 637 (1949)Google Scholar
  4. 4.
    Daubechies, I.: Ten lectures on wavelet. Society for Industrial and Applied Mathematics (1992)Google Scholar
  5. 5.
    Unser, M., Blu, T.: Mathematical properties of the jpeg2000 wavelet filters. IEEE Transaction on Image Processing 12, 1080–1090 (2003)CrossRefMathSciNetGoogle Scholar
  6. 6.
    Watson, A.B., Yang, G.Y., Solomon, J.A., Villasenor, J.: Visibility of wavelet quantization noise. IEEE Transaction on Image Processing 6, 1164–1175 (1997)CrossRefGoogle Scholar
  7. 7.
    Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Prooceedings of IEEE 87, 1167–1180 (1999) (Invited paper)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Marco Aguzzi
    • 1
  • Maria Grazia Albanesi
    • 1
  • Marco Ferretti
    • 1
  1. 1.Università degli Studi di PaviaPaviaItaly

Personalised recommendations