Joint robust watermarking and image compression

A joint watermarking and compression (JWC) paradigm is considered for the application of JPEG image compression to achieve an efficient tradeoff among the embedding rate, compression rate, embedding distortion, and robustness against a class of “natural” signal processing attacks, including spatial filtering, image resizing and rotation, random row and column deleting, and JPEG2000 recompression. This paper makes two novel contributions: First, a new JWC embedding method called joint odd-even watermarking and JPEG compression scheme is proposed to optimize compression rate and embedding distortion when watermarks are embedded into JPEG compressed images. Second, low-density parity-check codes are employed into the JWC system to obtain an efficient tradeoff between the embedding rate and robustness. Experimental results show that the proposed algorithm significantly outperforms the recently designed DEW (differential energy watermarking), DQW (differential quantization watermarking) and RA-SEC (repeat-accumulate code based selectively embedding in coefficients) schemes, in terms of compression rate, embedding distortion and robustness under the same embedding rate.

[1]  Min Wu,et al.  Data hiding in image and video .I. Fundamental issues and solutions , 2003, IEEE Trans. Image Process..

[2]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[3]  En-hui Yang,et al.  Joint robust watermarking and compression using variable-rate scalar quantization , 2009, 2009 11th Canadian Workshop on Information Theory.

[4]  En-Hui Yang,et al.  Joint Optimization of Run-Length Coding, Huffman Coding, and Quantization Table With Complete Baseline JPEG Decoder Compatibility , 2009, IEEE Transactions on Image Processing.

[5]  B. S. Manjunath,et al.  Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.

[6]  H. Vincent Poor,et al.  Density evolution for asymmetric memoryless channels , 2005, IEEE Transactions on Information Theory.

[7]  Thierry Pun,et al.  Second Generation Benchmarking and Application Oriented Evaluation , 2001, Information Hiding.

[8]  Reginald L. Lagendijk,et al.  Optimal differential energy watermarking of DCT encoded images and video , 2001, IEEE Trans. Image Process..

[9]  Evangelos Eleftheriou,et al.  Regular and irregular progressive edge-growth tanner graphs , 2005, IEEE Transactions on Information Theory.

[10]  Jean-Marie Moureaux,et al.  Indexing Lattice Vectors in a Joint Watermarking and Compression Scheme , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.