Exhibition QIM-based watermarking for digital cinema

نویسندگان

  • Pilar Callau Uson
  • Rony Darazi
  • Benoit M. Macq
چکیده

The copyright protection of Digital Cinema requires the insertion of forensic watermarks during exhibition playback. This paper presents a low-complexity exhibition watermarking method based on quantization index modulation (QIM) and embedded in the DCI compliant decoder. Watermark embedding is proposed to fit in the JPEG2000 decoding process, prior to the inverse wavelet transform and such as it has a minimal impact on the image quality, guarantying a strong link between decompression and watermarking. The watermark is embedded by using an adaptive-Spread Transform Dither Modulation (STDM) method, based on a new multi-resolution perceptual masking to adapt watermark strength. Watermark detection is thereafter performed over the wavelet transformation of the recovered images. The proposed approach offers a wide range of channel capacities according to robustness to several kinds of distortions while maintaining a low computational complexity. Watermarking detection performance on Digital Cinema pictures captured with a video camera from a viewing room has been preliminary assessed, showing very promising results. The proposed approach provides high levels of imperceptibility, yet good robustness to degradations resulting from camcorder exhibition capture, to common signal processing operations such as filtering or re-sampling, and to very high compression.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust content-dependent high-fidelity watermark for tracking in digital cinema

Forensic digital watermarking is a promising tool in the fight against piracy of copyrighted motion imagery content, but to be effective it must be (1) imperceptibly embedded in high-definition motion picture source, (2) reliably retrieved, even from degraded copies as might result from camcorder capture and subsequent very-low-bitrate compression and distribution on the Internet, and (3) secur...

متن کامل

Nested Quantization Index Modulation for Reversible Watermarking and Its Application to Healthcare Information Management Systems

Digital watermarking has attracted lots of researches to healthcare information management systems for access control, patients' data protection, and information retrieval. The well-known quantization index modulation-(QIM-) based watermarking has its limitations as the host image will be destroyed; however, the recovery of medical images is essential to avoid misdiagnosis. In this paper, we pr...

متن کامل

Adaptive spread transform QIM watermarking algorithm based on improved perceptual models

The quantization step is one of the most important factors which affect the performance of quantization watermarking used for image copyright protection. According to the characteristic of perceptual model and the specific attacks, improved perceptual model and different implementations of perceptual model eywords: uantization watermarking erceptual model pread transform uantization index modul...

متن کامل

An Effective Reversible Watermarking for 2D CAD Engineering Graphics Based on Improved QIM

Quantization index modulation (QIM) is widely used in watermarking, but QIM cannot be applied to reversible watermarking directly due to its inherent limitations. In this paper, an improvement is made to QIM to make it suitable for reversible watermarking. Based on the improved QIM (IQIM), a reversible watermarking scheme for 2D CAD engineering graphics is proposed. The relative amplitudes and ...

متن کامل

Preprocessed and postprocessed quantization index modulation methods for digital watermarking

Quantization index modulation (QIM) methods, a class of digital watermarking and information embedding methods, achieve very e cient trade-o s among the amount of embedded information (rate), the amount of embedding-induced distortion to the host signal, and the robustness to intentional and unintentional attacks. For example, we show that against independent additive Gaussian attacks, which ar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009