Self-embedding watermarking scheme against JPEG compression with superior imperceptibility
To improve the imperceptibility, security and tamper detection performance, a self-embedding watermarking scheme against JPEG compression is proposed in this work. The recovery watermark of all blocks in the host image, which consists of 6-bit DC-code and 5-bit AC-code and simultaneously used to bot...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2017-04, Vol.76 (7), p.9681-9712 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 9712 |
---|---|
container_issue | 7 |
container_start_page | 9681 |
container_title | Multimedia tools and applications |
container_volume | 76 |
creator | Chen, Fan He, Hongjie Huo, Yaoran |
description | To improve the imperceptibility, security and tamper detection performance, a self-embedding watermarking scheme against JPEG compression is proposed in this work. The recovery watermark of all blocks in the host image, which consists of 6-bit DC-code and 5-bit AC-code and simultaneously used to both tamper detection and tamper recovery, is recombined based on the secret key and embedded in the quantized DCT coefficients. This strategy not only enhances the ability against the known forgery attacks due to introducing multi-blocks independency, but also improves the tamper detection performance by designing the tamper detection method based on the multi-neighbor characteristic and multi-threshold optimization. To achieve the better imperceptibility, the 7 middle frequency DCT coefficients of an 8 × 8 block are chosen to hide the 11-bit watermark by adopting the weight-function modulo based embedding method. Robustness against JPEG compression is enhanced by setting the quantization step of the chosen DCT coefficients according to the standard JPEG quantization table and an adjustable scaling factor which balances the robustness with imperceptibility. We also discuss the effects of different scaling factors on the imperceptibility and robustness in terms of peak signal to noise ratio (PSNR) and survival quality factor (SQF) of watermarked image generated by a given scaling factor. Experimental results demonstrate that the proposed method outperforms conventional semi-fragile restorable watermarking schemes in imperceptibility, tamper detection and tamper recovery in various forgery attacks especially for JPEG compression with low QFs. |
doi_str_mv | 10.1007/s11042-016-3574-0 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1904201341</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1904201341</sourcerecordid><originalsourceid>FETCH-LOGICAL-c349t-60f76752ac4a40e3b6cc362c200a3b9dc7185da51c03953a09b180e6cdc36e763</originalsourceid><addsrcrecordid>eNp1kE1Lw0AQhoMoWKs_wFvAi5fVmWySTY5SalUKCurFy7LZTNut-XI3ofTfuyUeRPA078DzDsMTBJcINwggbh0ixBEDTBlPRMzgKJhgIjgTIsJjn3kGTCSAp8GZc1vwYBLFk-DjlaoVo7qgsjTNOtypnmyt7OdhcXpDNYVqrUzj-vDpZb4IdVt3lpwzbRPuTL8J3dCRNa0NTe2Dpq43halMvz8PTlaqcnTxM6fB-_38bfbAls-Lx9ndkmke5z1LYSVSkURKxyoG4kWqNU8jHQEoXuSlFpglpUpQA88TriAvMANKdekxEimfBtfj3c62XwO5XtbGaaoq1VA7OIm5NwPIY_To1R902w628d9JzDIeZ4Jj5CkcKW1b5yytZGeNd7KXCPJgW462pZcoD7Yl-E40dpxnmzXZX5f_LX0DETKCMQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1883487312</pqid></control><display><type>article</type><title>Self-embedding watermarking scheme against JPEG compression with superior imperceptibility</title><source>Springer Nature - Complete Springer Journals</source><creator>Chen, Fan ; He, Hongjie ; Huo, Yaoran</creator><creatorcontrib>Chen, Fan ; He, Hongjie ; Huo, Yaoran</creatorcontrib><description>To improve the imperceptibility, security and tamper detection performance, a self-embedding watermarking scheme against JPEG compression is proposed in this work. The recovery watermark of all blocks in the host image, which consists of 6-bit DC-code and 5-bit AC-code and simultaneously used to both tamper detection and tamper recovery, is recombined based on the secret key and embedded in the quantized DCT coefficients. This strategy not only enhances the ability against the known forgery attacks due to introducing multi-blocks independency, but also improves the tamper detection performance by designing the tamper detection method based on the multi-neighbor characteristic and multi-threshold optimization. To achieve the better imperceptibility, the 7 middle frequency DCT coefficients of an 8 × 8 block are chosen to hide the 11-bit watermark by adopting the weight-function modulo based embedding method. Robustness against JPEG compression is enhanced by setting the quantization step of the chosen DCT coefficients according to the standard JPEG quantization table and an adjustable scaling factor which balances the robustness with imperceptibility. We also discuss the effects of different scaling factors on the imperceptibility and robustness in terms of peak signal to noise ratio (PSNR) and survival quality factor (SQF) of watermarked image generated by a given scaling factor. Experimental results demonstrate that the proposed method outperforms conventional semi-fragile restorable watermarking schemes in imperceptibility, tamper detection and tamper recovery in various forgery attacks especially for JPEG compression with low QFs.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-016-3574-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Analysis ; Computer Communication Networks ; Computer Science ; Data Structures and Information Theory ; Digital watermarks ; Forgery ; Image compression ; Image processing systems ; JPEG encoders-decoders ; Multimedia ; Multimedia Information Systems ; Quantization ; Recovery ; Robustness ; Scaling factors ; Security ; Special Purpose and Application-Based Systems ; Studies ; Watermarking ; Wavelet transforms</subject><ispartof>Multimedia tools and applications, 2017-04, Vol.76 (7), p.9681-9712</ispartof><rights>Springer Science+Business Media New York 2016</rights><rights>Multimedia Tools and Applications is a copyright of Springer, 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c349t-60f76752ac4a40e3b6cc362c200a3b9dc7185da51c03953a09b180e6cdc36e763</citedby><cites>FETCH-LOGICAL-c349t-60f76752ac4a40e3b6cc362c200a3b9dc7185da51c03953a09b180e6cdc36e763</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-016-3574-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-016-3574-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Chen, Fan</creatorcontrib><creatorcontrib>He, Hongjie</creatorcontrib><creatorcontrib>Huo, Yaoran</creatorcontrib><title>Self-embedding watermarking scheme against JPEG compression with superior imperceptibility</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>To improve the imperceptibility, security and tamper detection performance, a self-embedding watermarking scheme against JPEG compression is proposed in this work. The recovery watermark of all blocks in the host image, which consists of 6-bit DC-code and 5-bit AC-code and simultaneously used to both tamper detection and tamper recovery, is recombined based on the secret key and embedded in the quantized DCT coefficients. This strategy not only enhances the ability against the known forgery attacks due to introducing multi-blocks independency, but also improves the tamper detection performance by designing the tamper detection method based on the multi-neighbor characteristic and multi-threshold optimization. To achieve the better imperceptibility, the 7 middle frequency DCT coefficients of an 8 × 8 block are chosen to hide the 11-bit watermark by adopting the weight-function modulo based embedding method. Robustness against JPEG compression is enhanced by setting the quantization step of the chosen DCT coefficients according to the standard JPEG quantization table and an adjustable scaling factor which balances the robustness with imperceptibility. We also discuss the effects of different scaling factors on the imperceptibility and robustness in terms of peak signal to noise ratio (PSNR) and survival quality factor (SQF) of watermarked image generated by a given scaling factor. Experimental results demonstrate that the proposed method outperforms conventional semi-fragile restorable watermarking schemes in imperceptibility, tamper detection and tamper recovery in various forgery attacks especially for JPEG compression with low QFs.</description><subject>Analysis</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data Structures and Information Theory</subject><subject>Digital watermarks</subject><subject>Forgery</subject><subject>Image compression</subject><subject>Image processing systems</subject><subject>JPEG encoders-decoders</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Quantization</subject><subject>Recovery</subject><subject>Robustness</subject><subject>Scaling factors</subject><subject>Security</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Studies</subject><subject>Watermarking</subject><subject>Wavelet transforms</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp1kE1Lw0AQhoMoWKs_wFvAi5fVmWySTY5SalUKCurFy7LZTNut-XI3ofTfuyUeRPA078DzDsMTBJcINwggbh0ixBEDTBlPRMzgKJhgIjgTIsJjn3kGTCSAp8GZc1vwYBLFk-DjlaoVo7qgsjTNOtypnmyt7OdhcXpDNYVqrUzj-vDpZb4IdVt3lpwzbRPuTL8J3dCRNa0NTe2Dpq43halMvz8PTlaqcnTxM6fB-_38bfbAls-Lx9ndkmke5z1LYSVSkURKxyoG4kWqNU8jHQEoXuSlFpglpUpQA88TriAvMANKdekxEimfBtfj3c62XwO5XtbGaaoq1VA7OIm5NwPIY_To1R902w628d9JzDIeZ4Jj5CkcKW1b5yytZGeNd7KXCPJgW462pZcoD7Yl-E40dpxnmzXZX5f_LX0DETKCMQ</recordid><startdate>20170401</startdate><enddate>20170401</enddate><creator>Chen, Fan</creator><creator>He, Hongjie</creator><creator>Huo, Yaoran</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20170401</creationdate><title>Self-embedding watermarking scheme against JPEG compression with superior imperceptibility</title><author>Chen, Fan ; He, Hongjie ; Huo, Yaoran</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c349t-60f76752ac4a40e3b6cc362c200a3b9dc7185da51c03953a09b180e6cdc36e763</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Analysis</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data Structures and Information Theory</topic><topic>Digital watermarks</topic><topic>Forgery</topic><topic>Image compression</topic><topic>Image processing systems</topic><topic>JPEG encoders-decoders</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Quantization</topic><topic>Recovery</topic><topic>Robustness</topic><topic>Scaling factors</topic><topic>Security</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Studies</topic><topic>Watermarking</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chen, Fan</creatorcontrib><creatorcontrib>He, Hongjie</creatorcontrib><creatorcontrib>Huo, Yaoran</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chen, Fan</au><au>He, Hongjie</au><au>Huo, Yaoran</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Self-embedding watermarking scheme against JPEG compression with superior imperceptibility</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2017-04-01</date><risdate>2017</risdate><volume>76</volume><issue>7</issue><spage>9681</spage><epage>9712</epage><pages>9681-9712</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>To improve the imperceptibility, security and tamper detection performance, a self-embedding watermarking scheme against JPEG compression is proposed in this work. The recovery watermark of all blocks in the host image, which consists of 6-bit DC-code and 5-bit AC-code and simultaneously used to both tamper detection and tamper recovery, is recombined based on the secret key and embedded in the quantized DCT coefficients. This strategy not only enhances the ability against the known forgery attacks due to introducing multi-blocks independency, but also improves the tamper detection performance by designing the tamper detection method based on the multi-neighbor characteristic and multi-threshold optimization. To achieve the better imperceptibility, the 7 middle frequency DCT coefficients of an 8 × 8 block are chosen to hide the 11-bit watermark by adopting the weight-function modulo based embedding method. Robustness against JPEG compression is enhanced by setting the quantization step of the chosen DCT coefficients according to the standard JPEG quantization table and an adjustable scaling factor which balances the robustness with imperceptibility. We also discuss the effects of different scaling factors on the imperceptibility and robustness in terms of peak signal to noise ratio (PSNR) and survival quality factor (SQF) of watermarked image generated by a given scaling factor. Experimental results demonstrate that the proposed method outperforms conventional semi-fragile restorable watermarking schemes in imperceptibility, tamper detection and tamper recovery in various forgery attacks especially for JPEG compression with low QFs.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-016-3574-0</doi><tpages>32</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2017-04, Vol.76 (7), p.9681-9712 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_miscellaneous_1904201341 |
source | Springer Nature - Complete Springer Journals |
subjects | Analysis Computer Communication Networks Computer Science Data Structures and Information Theory Digital watermarks Forgery Image compression Image processing systems JPEG encoders-decoders Multimedia Multimedia Information Systems Quantization Recovery Robustness Scaling factors Security Special Purpose and Application-Based Systems Studies Watermarking Wavelet transforms |
title | Self-embedding watermarking scheme against JPEG compression with superior imperceptibility |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T10%3A56%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Self-embedding%20watermarking%20scheme%20against%20JPEG%20compression%20with%20superior%20imperceptibility&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Chen,%20Fan&rft.date=2017-04-01&rft.volume=76&rft.issue=7&rft.spage=9681&rft.epage=9712&rft.pages=9681-9712&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-016-3574-0&rft_dat=%3Cproquest_cross%3E1904201341%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1883487312&rft_id=info:pmid/&rfr_iscdi=true |