Image Compression plays a very important role in image processing especially when we are to send the image on the internet. The threat to the information on the internet increases and image is no exception. Generally the image is sent on the internet as the compressed image to optimally use the bandwidth of the network. But as we are on the network, at any intermediate level the image can be changed intentionally or unintentionally. To make sure that the correct image is being delivered at the other end we embed the water mark to the image. The watermarked image is then compressed and sent on the network. When the image is decompressed at the other end we can extract the watermark and make sure that the image is the same that was sent by the other end. Though watermarking the image increases the size of the uncompressed image but that has to done to achieve the high degree of robustness i.e. how an image sustains the attacks on it. The present paper is an attempt to make transmission of the images secure from the intermediate attacks by applying the generally used compression transforms.
[1]
Markus G. Kuhn,et al.
Attacks on Copyright Marking Systems
,
1998,
Information Hiding.
[2]
P. W. Jones,et al.
Digital Image Compression Techniques
,
1991
.
[3]
Ingemar J. Cox,et al.
Informed embedding: exploiting image and detector information during watermark insertion
,
2000,
Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[4]
Sushil Jajodia,et al.
Steganalysis of Images Created Using Current Steganography Software
,
1998,
Information Hiding.
[5]
Frank Boland,et al.
Watermarking digital images for copyright protection
,
1995
.
[6]
Ingemar J. Cox,et al.
Review of watermarking and the importance of perceptual modeling
,
1997,
Electronic Imaging.
[7]
Mauro Barni,et al.
Capacity of the watermark channel: how many bits can be hidden within a digital image?
,
1999,
Electronic Imaging.
[8]
Wenjun Zeng,et al.
Image-adaptive watermarking using visual models
,
1998,
IEEE J. Sel. Areas Commun..