An Improved Self-embedding Algorithm: Digital Content Protection against Compression Attacks in Digital Watermarking

Lossy compression attacks in digital watermarking are one of the major issues in digital watermarking. Cheddad et al. proposed a robust secured self-embedding method which is resistant to a certain amount of JPEG compression. Our experimental results show that the self-embedding method is resistant to JPEG compression attacks and not resistant to other lossy compression attacks such as Block Truncation Coding (BTC) and Singular Value Decomposition (SVD). Therefore we improved Cheddad et al’s. method to give better protection against BTC and SVD compression attacks.

[1]  Jelena Kovacevic,et al.  Wavelets and Subband Coding , 2013, Prentice Hall Signal Processing Series.

[2]  Kevin Curran,et al.  A secure and improved self-embedding algorithm to combat digital document forgery , 2009, Signal Process..

[3]  H. Kikuchi,et al.  A New Robust Watermark Embedding into Wavelet DC Components , 2002 .

[4]  Majumder Dtuta,et al.  Digital Image Processing and Analysis , 2004 .

[5]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[6]  Huang Daren,et al.  A DWT-based image watermarking algorithm , 2001, IEEE International Conference on Multimedia and Expo, 2001. ICME 2001..

[7]  André Heck Linear Algebra: Applications , 1993 .

[8]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[9]  Richard Baraniuk,et al.  WInHD: Wavelet-based Inverse Halftoning via Deconvolution , 2002 .

[10]  Yong Wang,et al.  One-way hash function construction based on 2D coupled map lattices , 2008, Inf. Sci..

[11]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[12]  Ioannis Pitas,et al.  Protecting Digital-Image Copyrights: A Framework , 1999, IEEE Computer Graphics and Applications.

[13]  K.V. Indukuri,et al.  Similarity Analysis of Patent Claims Using Natural Language Processing Techniques , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[14]  H. S. Prasantha,et al.  Image Compression Using SVD , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[15]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[16]  Kevin Curran,et al.  A hash-based image encryption algorithm , 2010 .

[17]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999 .