An Improved Self-Embedding Algorithm: A Robust Protection against Lossy Compression Attacks in Digital Image Watermarking

Watermarking is the process of embedding watermark into an image such that embedded watermark can be extracted later. Lossy compression attacks in digital watermarking are one of the major issues in digital watermarking. Cheddad et al. proposed a robust secured self-embedding method which is resistant to a certain amount of JPEG compression. Our experimental results show that the self-embedding method is resistant to JPEG compression attacks and not resistant to other lossy compression attacks such as Block Truncation Coding (BTC) and Singular Value Decomposition (SVD). Therefore we improved Cheddad et al’s. method to give better protection against BTC and SVD compression attacks.

[1]  Yong Wang,et al.  One-way hash function construction based on 2D coupled map lattices , 2008, Inf. Sci..

[2]  Richard Baraniuk,et al.  WInHD: Wavelet-based Inverse Halftoning via Deconvolution , 2002 .

[3]  Kevin Curran,et al.  An Improved Self-embedding Algorithm: Digital Content Protection against Compression Attacks in Digital Watermarking , 2010, IP&C.

[4]  Jelena Kovacevic,et al.  Wavelets and Subband Coding , 2013, Prentice Hall Signal Processing Series.

[5]  Huang Daren,et al.  A DWT-based image watermarking algorithm , 2001, IEEE International Conference on Multimedia and Expo, 2001. ICME 2001..

[6]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[7]  Kevin Curran,et al.  A secure and improved self-embedding algorithm to combat digital document forgery , 2009, Signal Process..

[8]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[9]  H. Kikuchi,et al.  A New Robust Watermark Embedding into Wavelet DC Components , 2002 .

[10]  H. S. Prasantha,et al.  Image Compression Using SVD , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[11]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[12]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[13]  Kevin Curran,et al.  A hash-based image encryption algorithm , 2010 .

[14]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999 .

[15]  Ioannis Pitas,et al.  Protecting Digital-Image Copyrights: A Framework , 1999, IEEE Computer Graphics and Applications.

[16]  Michael W. Berns,et al.  Digital Image Processing and Analysis , 1986 .