Skip to main content
Log in

Scalable watermark extraction for real-time authentication of JPEG 2000 images

  • Special Issue
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

This paper proposes a novel scalable authentication scheme that utilizes the progressive enhancement functionality in JPEG 2000 scalable image coding. The proposed method first models the wavelet-based quality scalable coding to identify the effect of the quantization and de-quantization on wavelet coefficient magnitudes and the data embedded within such coefficients as a watermark. A relationship is then established between the watermark extraction rule and the embedding rule, using the magnitudes of the reconstructed and original coefficients. It ranks the wavelet coefficients according to their ability to retain the embedded watermark data intact under various quantization levels corresponding to quality enhancements. Then watermark data is embedded into wavelet coefficients according to their rank followed by JPEG 2000 embedded coding. At the decoder as more and more quality and resolution layers are decoded the authentication metric is improved, thus resulting in gradually increasing complexity of the authentication process according to the number of quality and resolution enhancements. The low complexity authentication is available at low quality low resolution decoding, enabling real-time authentication for resource constrained applications without affecting the authentication metric. Compared to the existing methods, the proposed method results in highly robust scalable authentication of JPEG 2000 coded images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22

Similar content being viewed by others

References

  1. Xie, L., Arce, G.R.: Joint wavelet compression and authentication watermarking. In: Proceedings of the IEEE ICIP, vol. 2, pp. 427–431 (1998)

  2. Huo, F., Gao, X.: A wavelet based image watermarking scheme. In: Proceedings of the IEEE ICIP, pp. 2573–2576 (2006)

  3. Kundur, D., Hatzinakos, D.: Digital watermarking using multiresolution wavelet decomposition. In: Proceedings of the IEEE ICASSP, vol. 5, pp. 2969–2972 (1998)

  4. Jin, C., Peng, J.: A robust wavelet-based blind digital watermarking algorithm. Information Technology Journal 5(2), 358–363 (2006)

    Article  Google Scholar 

  5. Tao, H., Liu, J., Tian, J.: Digital watermarking technique based on integer Harr transforms and visual properties. In: Proceedings of the SPIE Image Compression and Encryption Technologies, vol. 4551, no. 1, pp. 239–244 (2001)

  6. Xia, X., Boncelet, C.G., Arce, G.R.: Wavelet transform based watermark for digital images. Opt. Express 3(12), 497–511 (1998)

    Article  Google Scholar 

  7. Feng, X.C., Yang, Y.: A new watermarking method based on DWT. In: Proceedings of the International Conference on Computational Intelligence and Security, Lecture Notes in Computer Science (LNCS), vol. 3802, pp. 1122–1126 (2005)

  8. Gong, Q., Shen, H.: Toward blind logo watermarking in JPEG-compressed images. In: Proceedings of the International Conference on Parallel and Distributed Computing, Applications and Techniques (PDCAT), pp. 1058–1062 (2005)

  9. Barni, M., Bartolini, F., Piva, A.: Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. Image Process. 10(5), 783–791 (2001)

    Article  MATH  Google Scholar 

  10. Kundur, D., Hatzinakos, D.: Toward robust logo watermarking using multiresolution image fusion principles. IEEE Trans. Multimed. 6(1), 185–198 (2004)

    Article  Google Scholar 

  11. Zhang, Z., Mo, Y.L.: Embedding strategy of image watermarking in wavelet transform domain. In: Proceedings of the SPIE Image Compression and Encryption Technologies, vol. 4551, no. 1, pp. 127–131 (2001)

  12. Kim, J.R., Moon, Y.S.: A robust wavelet-based digital watermarking using level-adaptive thresholding. In: Proceedings of the IEEE ICIP, vol. 2, pp. 226–230 (1999)

  13. Marusic, S., Tay, D.B.H., Deng, G., Marimuthu, P.: A study of biorthogonal wavelets in digital watermarking. In: Proceedings of the IEEE ICIP, vol. 3, pp. II-463–466 (2003)

  14. Chen, T.-S., Chen, J., Chen, J.-G.: A simple and efficient watermarking technique based on JPEG2000 codec. In: Proceedings of the International Symposium on Multimedia Software Engineering, pp. 80–87 (2003)

  15. Dufaux, F., Wee, S.J., Apostolopoulos, J.G., Ebrahimi, T.: JPSEC for secure imaging in JPEG2000. In: Proceedings of the SPIE Applications of Digital Image Processing XXVII, vol. 5558, no. 1, pp. 319–330 (2004)

  16. Seo, Y.-S., Kim, M.-S., Park, H.-J., Jung, H.-Y., Chung, H.-Y., Huh, Y., Lee, J.-D.: A secure watermarking for JPEG2000. In: Proceedings of the IEEE ICIP, vol. 2, pp. 530–533 (2001)

  17. Meerwald, P.: Quantization watermarking in the JPEG2000 coding pipeline. In: Proceedings of the International Working Conference on Communications and Multimedia Security, pp. 69–79 (2001)

  18. Sun, Q., Chang, S.: A secure and robust digital signature scheme for JPEG2000 image authentication. IEEE Trans. Multimed. 7(3), 480–494 (2005)

    Article  Google Scholar 

  19. Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication and access control in the JPEG2000 compressed domain. In: Proceedings of the SPIE Applications of Digital Image Processing XXIV, vol. 4472, no. 1, pp. 95–104 (2001)

  20. Suhail, M.A., Obaidat, M.S., Ipson, S.S., Sadoun, B.: A comparative study of digital watermarking in JPEG and JPEG2000 environments. Inf. Sci. 151, 93–105 (2003)

    Article  MATH  Google Scholar 

  21. Grosbois, R., Ebrahimi, T.: Watermarking in the JPEG 2000 domain. In: Proceedings of the IEEE MMSP, pp. 339–344 (2001)

  22. Taubman, D.S., Marcellin, M.W.: JPEG2000 Image Compression Fundamentals, Standards and Practice. Springer, USA (2002)

    Book  Google Scholar 

  23. Ebrahimi, T., Grosbois, R.: Secure JPEG 2000-JPSEC. In: Proceedings of the IEEE ICASSP, vol. 4, pp. 716–719 (2003)

  24. Bhowmik, D., Abhayaratne, C.: Evaluation of watermark robustness to JPEG2000 based content adaptation attacks. In: Proceedings of the IET International Conference on Visual Information Engineering (VIE ’08), pp. 789–794 (2008)

  25. Campisi, P.: Video watermarking in the 3D-DWT domain using quantization-based methods. In: Proceedings of the IEEE MMSP, pp. 1–4 (2005)

  26. Meerwald, P., Uhl, A.: A survey of wavelet-domain watermarking algorithms. In: Proceedings of the SPIE Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 505–516 (2001)

  27. Bhowmik, D., Abhayaratne, C.: A framework for evaluating wavelet based watermarking for scalable coded digital item adaptation attacks. In: Proceedings of the SPIE Wavelet Applications in Industrial Processing VI, vol. 7248, no. 1, pp. 72480M (2009)

  28. Bhowmik, D., Abhayaratne, C.: Watermarking evaluation bench for content adaptation modes (WEBCAM). http://svc.group.shef.ac.uk/webcam.html. Accessed Jan 2010 (online)

Download references

Acknowledgments

The support of the UK Engineering and Physical Sciences Research Council (EPSRC) for this work is acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Charith Abhayaratne.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Abhayaratne, C., Bhowmik, D. Scalable watermark extraction for real-time authentication of JPEG 2000 images. J Real-Time Image Proc 8, 307–325 (2013). https://doi.org/10.1007/s11554-011-0218-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-011-0218-5

Keywords

Navigation