1 February 2006 Image watermarking through attack simulation
Jiann-Shu Lee, Ching-Tsorng Tsai, Chao-Hui Ko
Author Affiliations +
Abstract
One of the most significant requirements for a useful watermarking system is strong resistance to a variety of common attacks. Accordingly, the watermark embedding is designed from the attack perspective in this paper. We attempt to develop a new just-noticeable distortion (JND) in the discrete cosine transform (DCT) domain, based on an attack simulation scheme that reversely derives the maximum modification amount embedded in the DCT domain under a condition of imperceptibility. A new location selection approach to watermark embedding is also addressed. We evaluate the fitness of the embedding location by considering the embedding capacity, i.e., the JND of the considered frequency component, in addition to the frequency and the spectral strength, which are usually adopted by the existing methods. Experimental results show satisfactory ability of our method to resist various common attacks such as JPEG compression, smoothing, sharpening, cropping, and noise attacks.
©(2006) Society of Photo-Optical Instrumentation Engineers (SPIE)
Jiann-Shu Lee, Ching-Tsorng Tsai, and Chao-Hui Ko "Image watermarking through attack simulation," Optical Engineering 45(2), 027001 (1 February 2006). https://doi.org/10.1117/1.2167956
Published: 1 February 2006
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Image compression

Optical engineering

Resistance

Distortion

Image processing

Binary data

RELATED CONTENT


Back to Top