JPEG 2000: Image Compression Fundamentals, Standards and Practice
JPEG 2000: Image Compression Fundamentals, Standards and Practice
Quantization Watermarking in the JPEG2000 Coding Pipeline
Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues of the New Century
A comparative study of digital watermarking in JPEG and JPEG 2000 environments
Information Sciences—Informatics and Computer Science: An International Journal
Toward Blind Logo Watermarking in JPEG-Compressed Images
PDCAT '05 Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
A new watermarking method based on DWT
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Toward robust logo watermarking using multiresolution image fusion principles
IEEE Transactions on Multimedia
A secure and robust digital signature scheme for JPEG2000 image authentication
IEEE Transactions on Multimedia
Improved wavelet-based watermarking through pixel-wise masking
IEEE Transactions on Image Processing
Hi-index | 0.00 |
This paper proposes a novel scalable authentication scheme that utilizes the progressive enhancement functionality in JPEG 2000 scalable image coding. The proposed method first models the wavelet-based quality scalable coding to identify the effect of the quantization and de-quantization on wavelet coefficient magnitudes and the data embedded within such coefficients as a watermark. A relationship is then established between the watermark extraction rule and the embedding rule, using the magnitudes of the reconstructed and original coefficients. It ranks the wavelet coefficients according to their ability to retain the embedded watermark data intact under various quantization levels corresponding to quality enhancements. Then watermark data is embedded into wavelet coefficients according to their rank followed by JPEG 2000 embedded coding. At the decoder as more and more quality and resolution layers are decoded the authentication metric is improved, thus resulting in gradually increasing complexity of the authentication process according to the number of quality and resolution enhancements. The low complexity authentication is available at low quality low resolution decoding, enabling real-time authentication for resource constrained applications without affecting the authentication metric. Compared to the existing methods, the proposed method results in highly robust scalable authentication of JPEG 2000 coded images.