JPEG 2000: Image Compression Fundamentals, Standards and Practice
JPEG 2000: Image Compression Fundamentals, Standards and Practice
The first 50 years of electronic watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Quantization Watermarking in the JPEG2000 Coding Pipeline
Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues of the New Century
A survey of watermarking algorithms for image authentication
EURASIP Journal on Applied Signal Processing
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
Dual domain watermarking for authentication and compression of cultural heritage images
IEEE Transactions on Image Processing
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |
A digital watermarking approach highly robust to lossy image compression is presented. It is shown how geometrically warping objects can be used to imperceptibly embed information into images for the purpose of property rights protection. Common lossy image compression is optimized for maintaining the geometric image structure. Hence, as we demonstrate, the embedded information is not affected by a successive embedding approach in the compression domain. This second watermarking scheme is used for an efficient JPEG2000-based image authentication, which is robust to JPEG compression and other allowed signal processing operations. We enhance positive wavelet-based water-marking approaches proposed in recent years by image adaptive perceptual modeling and error correction coding without raising a security gap. Our new method is secure in contrast to most of the schemes proposed so far. Lots of popular features of the JPEG2000 compression framework such as quality and resolution scalability, lossless image rotation and flipping are supported. All coefficients of the wavelet decomposition are protected using our new extended scalar quantization and hashing scheme.