Joint Watermarking and Compression for Images in Transform Domain

نویسنده

  • Gamal Fahmy
چکیده

Image watermarking, authentication and encryption have gained an increased importance during the last decade. This is due to the widespread use of visual media over the Internet and in several digital media applications. Several watermarking techniques have been proposed, some in spatial domain, and more recently in the transform/frequency domain and have been reported to be robust against different attacks, namely compression. It is also well known the importance and effectiveness of compression techniques to store transmit and retrieve visual information. However, the creation or development of a joint watermarking and compression framework for images has yet to be explored, where watermarking and compression could be pursued jointly on a trade-off manner. In other words, watermarking embedding/extraction can be performed on compressed domain data, while compression parameters could be used as watermarking keys. The primary focus of this paper is to explore this novel/unique idea. We propose a joint watermarking and compression (JWC) technique in the transform domain. This transform domain is based on the Natural Preserve Transform and can be utilized to achieve a balance between watermarking and compression for visual information. Watermarking performance is evaluated blindly for different compressed domain data scenarios, while compression performance is analyzed for other watermarking cases. Extensive simulation results that demonstrate the efficiency of the proposed joint watermarking and compression technique are presented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Modified Digital Image Watermarking Scheme Based on Nonnegative Matrix Factorization

This paper presents a modified digital image watermarking method based on nonnegative matrix factorization. Firstly, host image is factorized to the product of three nonnegative matrices. Then, the centric matrix is transferred to discrete cosine transform domain. Watermark is embedded in low frequency band of this matrix and next, the reverse of the transform is computed. Finally, watermarked ...

متن کامل

A Modified Digital Image Watermarking Scheme Based on Nonnegative Matrix Factorization

This paper presents a modified digital image watermarking method based on nonnegative matrix factorization. Firstly, host image is factorized to the product of three nonnegative matrices. Then, the centric matrix is transferred to discrete cosine transform domain. Watermark is embedded in low frequency band of this matrix and next, the reverse of the transform is computed. Finally, watermarked ...

متن کامل

A Robust Image Watermarking in the Joint Time-Frequency Domain

With the rapid development of computers and internet applications, copyright protection of multimedia data has become an important problem. Watermarking techniques are proposed as a solution to copyright protection of digital media files. In this paper, a new, robust, and high-capacity watermarking method that is based on spatiofrequency (SF) representation is presented. We use the discrete evo...

متن کامل

Joint Wavelet Compression and Authentication Watermarking

A blind watermarking technique embedding a digital image signature for authentication is developed. The signature algorithm is rst implemented in the discrete wavelet transform (DWT) domain and is later coupled within the SPIHT compression algorithm. The capacity of the watermarking method is determined by the upper bound on the attainable information bit rate that can be hidden in the image us...

متن کامل

An improved hybrid image watermarking scheme in shearlet and wavelet domain

Watermarking is one of the best solutions for copyright protection and authentication of multimedia contents. In this paper a hybrid scheme is proposed using wavelet and shearlet transforms with singular value decomposition. For better security, Arnold map is used for encryption. Examining the results and comparing with other methods show that this hybrid proposed scheme with simultaneous utili...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012