TABLE 2: Comparison of JPEG compression
effect for 2nd level and 5th level decomposition of
image |
JPEG Compression
ratio |
TAF for
2nd level
decomposition |
TAF for
5th level
decomposition |
1 |
0.4914 |
0.4912 |
2 |
0.4998 |
0.4910 |
3 |
0.4940 |
0.5051 |
4 |
0.4968 |
0.4971 |
5 |
0.4989 |
0.4930 |
6 |
0.4978 |
0.5029 |
7 |
0.4962 |
0.4908 |
8 |
0.4941 |
0.4799 |
9 |
0.5006 |
0.3869 |
10 |
0.4993 |
0.3743 |
|
|
|
|
|
|
7. CONCLUSION
Due to ease in the availability of digital media,
watermarking them has become an important issue for
digital right management and tamper proofing. A brief
survey of different watermarking techniques has been
carried out in this paper. Further, wavelet based tamper
proofing of images has been successfully carried out
and the results are presented in this paper. Attacks
based on averaging filter and compression were applied
and the tampering was successfully detected by the
proposed technique in all the cases.
REFERENCES
- C I Podilchuk & E J Delp, Digital Watermarking:
Algorithms and Applications, IEEE Signal
Processing Magazine, vol 18, pp 33-46, Jul 2001.
- M-S Hsieh, D-C Tseng Y-H Huang, Hiding Digital
Watermarks Using Multiresolution Wavelet
Transform, IEEE Transactions on Industrial
Electronics, vol 48, no 5, pp 875-882, Oct 2001.
- 3. A P Fabien & Petitcolas, Watermarking Schemes
Evaluation, IETE Signal Processing Magazine, vol
17, pp 58-64, Sep 2000.
- C Shoemaker & Rudko, Hidden Bits-A Survey of
Techniques for Digital Watermarking, Spring
Project, EER-290, 2002.
- S Craver, N Memon, B L Yeo & M M Yeung,
Resolving Rightful Ownerships with Invisible
Watermarking Techniques: Limitations, Attacks and
Implications, IEEE Journal on Selected Areas in
Communications, vol 16, no 4, pp 573-586, May
1998.
|
|
- J F Delaigle, D De Vleeschouwer & B Macq, Low
cost perceptive digital picture watermarking method,
Proc ECMAST’97, Milan, Italy, May 1997, pp 153-
167.
- S. Craver, N Memon, B L Yeo & M Yeung, Can
invisible watermarks resolve rightful ownerships?, IBM Res Rep RC 20509, July 1996.
- I J Cox, J P Linnartz & T Shamoon, Public
watermarks and resistance to tampering, Proc Int.
Conf Image Processing (ICIP), volume 3, 26-29 Oct
1997 pp 3-6, 1997.
- F M Boland, J J K O Ruanaidh & W J Dowling,
Watermarking digital images for copyright
protection, Proc Int Conf Image Processing and Its
Applications, vol 410, Edinburgh, UK, pp 326-330
July 1995.
- A Bors & I Pitas, Embedding parametric digital
signatures in images, EUSIPCO-96, Trieste, Italy,
vol III, pp 1701-1704, Sept 1996.
- J Brassil, S Low, N Maxemchuk & L O’Gorman,
Electronic marking and identification techniques to
discourage document copying, IEEE J Select Areas
Comm, vol 13, pp 1495-1504, Oct. 1995.
- C W Yang, Watermarking, Tamper-Proofing and
Obfuscation, Technical Report, Computer Center,
Dept of Computer & Information Science National
Chiao Tung University, 2000.
- O Bruyndonckx, J J Quisquater & B Macq, Spatial
method for copyright labeling of digital images, Proc
IEEE-Workshop Nonlinear Signal and Image
Processing, Halkidiki, Greece, pp 456-459, June
1995.
- M Barni, F Bartolini, V Cappellini & A Piva, A
DCT domain system for robust image watermarking, Signal Processing (Special Issue on Watermarking),
vol 66, no 3, pp 357-372, May 1998.
- M Barni, F Bartolini, V Cappellini, A Piva & F
Rigacci, A M.A.P. identification criterion for DCTbased
watermarking, Proc Europ Signal Processing
Conf (EUSIPCO ’98), Rhodes, Greece, pp 17-20
Sept 1998.
- D Benham, N Memon, B L Yeo & M Yeung, Fast
watermarking of DCT-based compressed images, Proc Int Conf Image Science, Systems, and
Technology (CISST ’97), Las Vegas, NV, June 1997,
pp 243-253.
- I J Cox & J P. Linnartz, Some general methods for
tampering with watermarks, IEEE J Select Areas
Comm (Special Issue on Copyright and Privacy
Protection), vol 16, pp 587-593, May 1998.
- D Kundur, Multiresolution digital Watermarking:
Algorithms and Implications For Multimedia
Signals, Thesis of degree of doctor of philosophy, University of Toronto, 1999.
- F Hartung & M Kutter, Multimedia Watermarking
Techniques, Proc IEEE, vol 87, no 7, pp 1079-1107,
July 1999.
- Lim and D June, Digital Watermarking, SNU Mai
Lab, Summer Project, 2003.
|