Abstract
A new region of interest (ROI)-based watermarking method for JPEG 2000 is presented. The watermark is embedded into the host image based on the characteristics of the ROI to protect rights to the images. This scheme integrates the watermarking process with JPEG 2000 compression procedures. Experimental results have demonstrated that the proposed watermark technique successfully survives JPEG 2000 compression, progressive transmission, and principal attacks.
Similar content being viewed by others
References
S. Emmanuel, H.C. Kiang, A. Das, A reversible watermarking scheme for JPEG 2000 compressed images, in IEEE International Conference on Multimedia and Expo, July 2005, pp. 69–72
Y.C. Fan, H.W. Tsao, Watermarking for intellectual property protection. Electron. Lett. 39(18), 1316–1318 (2003)
Y.C. Fan, Testing-based watermarking techniques for intellectual property identification in SOC design. IEEE Trans. Instrum. Meas. 57(3), 467–479 (2008)
Y.C. Fan, H.W. Tsao, A dual pyramid watermarking for JPEG 2000, in IEEE 19th International Conference on Advanced Information Networking and Applications, March 2005, pp. 239–242
C.J. Lian, K.F. Chen, H.H. Chen, L.G. Chen, Analysis and architecture design of lifting based DWT and EBCOT for JPEG 2000, in 2001 International Symposium on VLSI Technology, Systems, and Applications, April 2001, pp. 180–183
C.J. Lian, K.F. Chen, H.H. Chen, L.G. Chen, Analysis and architecture design of block-coding engine for EBCOT in JPEG 2000. IEEE Trans. Circuits Syst. Video Technol. 13(3), 219–230 (2003)
K. Li, X.P. Zhang, An image watermarking method integrating with JPEG 2000 still image compression standard, in Canadian Conference on Electrical and Computer Engineering, vol. 3 (2003), pp. 2051–2054
D.C. Lou, J.L. Liu, M.C. Chang, Digital watermarking using multi-resolution wavelet transform, in IEEE 37th Annual 2003 International Carnahan Conference on Security Technology (2003), pp. 370–377
A. Makhloufi, A.O. Zaid, R. Boualleg, A. Boualleg, QIM watermarking combined to JPEG 2000 part I and II, in 18th International Conference on Pattern Recognition, vol. 3 (2006), pp. 746–749
Y.S. Seo, S. Joo, H.Y. Jung, An efficient quantization watermarking on the lowest wavelet sub-band. IEICE Trans. Fundam. Commun. Comput. Sci. E86-A(8), 2053–2055 (2003)
Q. Sun, S.F. Chang, A secure and robust digital signature scheme for JPEG 2000 image authentication. IEEE Trans. Multimedia 7(3), 480–494 (2005)
D.S. Taubman, JPEG 2000 Image Compression Fundamentals, Standards and Practice (Kluwer Academic, Dordrecht, 2002)
N. Thomos, N.V. Boulgouris, E. Kokkinou, M.G. Strintzis, Efficient data hiding in JPEG 2000 images using sequential decoding of convolutional codes. Int. Conf. Digit. Signal Process. 2, 717–720 (2002)
Y. Xiang, M. Salehi, Capacity bounds and rate-distortion-analysis in dither vector QIM watermarking with JPEG and JPEG 2000 attack, in 40th Annual Conference on Information Sciences and Systems (2006), pp. 766–770
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Fan, YC., Chiang, A. & Shen, JH. ROI-based Watermarking Scheme for JPEG 2000. Circuits Syst Signal Process 27, 763–774 (2008). https://doi.org/10.1007/s00034-008-9055-6
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00034-008-9055-6