Skip to main content
Log in

ROI-based Watermarking Scheme for JPEG 2000

  • Published:
Circuits, Systems & Signal Processing Aims and scope Submit manuscript

Abstract

A new region of interest (ROI)-based watermarking method for JPEG 2000 is presented. The watermark is embedded into the host image based on the characteristics of the ROI to protect rights to the images. This scheme integrates the watermarking process with JPEG 2000 compression procedures. Experimental results have demonstrated that the proposed watermark technique successfully survives JPEG 2000 compression, progressive transmission, and principal attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. S. Emmanuel, H.C. Kiang, A. Das, A reversible watermarking scheme for JPEG 2000 compressed images, in IEEE International Conference on Multimedia and Expo, July 2005, pp. 69–72

  2. Y.C. Fan, H.W. Tsao, Watermarking for intellectual property protection. Electron. Lett. 39(18), 1316–1318 (2003)

    Article  Google Scholar 

  3. Y.C. Fan, Testing-based watermarking techniques for intellectual property identification in SOC design. IEEE Trans. Instrum. Meas. 57(3), 467–479 (2008)

    Article  Google Scholar 

  4. Y.C. Fan, H.W. Tsao, A dual pyramid watermarking for JPEG 2000, in IEEE 19th International Conference on Advanced Information Networking and Applications, March 2005, pp. 239–242

  5. C.J. Lian, K.F. Chen, H.H. Chen, L.G. Chen, Analysis and architecture design of lifting based DWT and EBCOT for JPEG 2000, in 2001 International Symposium on VLSI Technology, Systems, and Applications, April 2001, pp. 180–183

  6. C.J. Lian, K.F. Chen, H.H. Chen, L.G. Chen, Analysis and architecture design of block-coding engine for EBCOT in JPEG 2000. IEEE Trans. Circuits Syst. Video Technol. 13(3), 219–230 (2003)

    Article  Google Scholar 

  7. K. Li, X.P. Zhang, An image watermarking method integrating with JPEG 2000 still image compression standard, in Canadian Conference on Electrical and Computer Engineering, vol. 3 (2003), pp. 2051–2054

  8. D.C. Lou, J.L. Liu, M.C. Chang, Digital watermarking using multi-resolution wavelet transform, in IEEE 37th Annual 2003 International Carnahan Conference on Security Technology (2003), pp. 370–377

  9. A. Makhloufi, A.O. Zaid, R. Boualleg, A. Boualleg, QIM watermarking combined to JPEG 2000 part I and II, in 18th International Conference on Pattern Recognition, vol. 3 (2006), pp. 746–749

  10. Y.S. Seo, S. Joo, H.Y. Jung, An efficient quantization watermarking on the lowest wavelet sub-band. IEICE Trans. Fundam. Commun. Comput. Sci. E86-A(8), 2053–2055 (2003)

    Google Scholar 

  11. Q. Sun, S.F. Chang, A secure and robust digital signature scheme for JPEG 2000 image authentication. IEEE Trans. Multimedia 7(3), 480–494 (2005)

    Article  Google Scholar 

  12. D.S. Taubman, JPEG 2000 Image Compression Fundamentals, Standards and Practice (Kluwer Academic, Dordrecht, 2002)

    Google Scholar 

  13. N. Thomos, N.V. Boulgouris, E. Kokkinou, M.G. Strintzis, Efficient data hiding in JPEG 2000 images using sequential decoding of convolutional codes. Int. Conf. Digit. Signal Process. 2, 717–720 (2002)

    Google Scholar 

  14. Y. Xiang, M. Salehi, Capacity bounds and rate-distortion-analysis in dither vector QIM watermarking with JPEG and JPEG 2000 attack, in 40th Annual Conference on Information Sciences and Systems (2006), pp. 766–770

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Cheng Fan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fan, YC., Chiang, A. & Shen, JH. ROI-based Watermarking Scheme for JPEG 2000. Circuits Syst Signal Process 27, 763–774 (2008). https://doi.org/10.1007/s00034-008-9055-6

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00034-008-9055-6

Keywords

Navigation