In this paper a novel semifragile watermarking scheme for images with multiple bands is presented. We propose to use the remote sensing image as a whole, using a vector quantization approach, instead of processing each band separately. This scheme uses the signature of the multispectral or hyperspectral image to embed the mark in it and detects a modification of the original image, e.g. a replacement of a part of the image into the same image or any other similar manipulation. A modification of the image means to modify the signature of each point, all the bands simultaneously, because in multispectral images it does not have sense to modify a single band of all those that compose the multispectral image. The original multispectral or hyperspectral image is segmented in three-dimensional blocks and, for each block, a tree structured vector quantizer is built, using all bands at the same time. These trees are manipulated using an iterative algorithm until the resulting image compressed by the manipulated tree satisfies all the imposed conditions by such tree, which represents the embedded mark. Each tree is partially modified accordingly to a secret key in order to avoid copy-and-replace attacks, and this key determines the internal structure of the tree and, also, the resulting distortion, in order to make the resulting image robust against near-lossless compression. The results show that the method works correctly with multispectral and hyperspectral images and detects copy-and-replace attacks from segments of the same image and basic modifications of the marked image.
KEYWORDS: Digital watermarking, Signal processing, Signal detection, Information security, Detection and tracking algorithms, Resistance, Image compression, Binary data, Data hiding, Distortion
This paper presents a benchmark assessment of the WAUC digital audio watermarking scheme, which relies on MPEG 1 Layer 3 compression to determine where and how the embedded mark must be introduced. The mark is embedded by modifying the magnitude of the spectrum at several frequencies which are chosen according to the difference between the original and the compressed audio content. The main advantage of the scheme is that the perceptual masking of the compressor is implicitly used and, thus, the scheme can be directly tested with different maskings by replacing the compressor. Since repeat coding of the mark is used, a majority voting scheme is applied to improve robustness. The scheme also uses a dual Hamming error correcting code for the embedded mark, which makes it possible to apply it for fingerprinting, achieving robustness against the collusion of two buyers. Several tuning parameters affect the embedding and reconstruction processes, the values of which are chosen according to the tuning guidelines obtained in previous works. In order to illustrate the robustness of the method, the WAUC scheme has been tested against several evaluation profiles, such as the attacks introduced in the Watermark Evaluation Testbed (WET) for audio.
We perform an empirical evaluation of the lossy compression properties of the JPEG2000 standard for watermarking and fingerprinting purposes. The JPEG2000 standard is used as a basic tool for determining both how and where the embedded watermark should be placed in the image. The original image is slightly modified to generate a similar image (but indistinguishable by the observer), and the mark is embedded in the pixels presenting differences between both images. The reconstruction process uses the original and the modified images to detect the embedded mark in any possible attacked image, so the watermarking scheme is nonblind. Previous experiments show that the properties of the resulting watermarking scheme depend strongly on the transformation stage characteristics of the lossy image compression system. Several parameters related to the JPEG2000 standard are tested, in addition to the compression ratio determined by the desired bit rate: the wavelet transform, block size, and the number of levels of decomposition for each block. These parameters affect not only the capacity but also the robustness of the watermarking scheme, which depends on the number of differing pixels between the original image and the slightly modified one, and the distribution of such differences. For evaluation purposes, we use the Stirmark benchmark and the classical image corpus set for lossy image compression. We compare the impact on system performance of each of the JPEG2000 standard parameters for several kinds of attacks, namely, filtering (including sharpening); JPEG lossy compression; cropping; row and column removal; and a combination of rotation, cropping, and scaling. The false positive rate is also studied. Results show that the proposed watermarking scheme based on the JPEG2000 standard is robust against most of the classical image manipulation operation, and therefore, is suitable for watermarking purposes.
In this paper we evaluate the performance of several image
watermarking schemes applied to hyperspectral imaging. An image
watermarking scheme based on JPEG2000 which can be also used to
store and manipulate hyperspectral images is also described.
Different watermarking schemes are tested in order to determine
the suitability of each one for a specific hyperspectral image
environment. The impact of classical GIS operations (namely
zooming, cropping and compression) on the performance of each
watermarking scheme is measured in terms of capacity and
robustness. In order to do so, we study several possibilities for
watermarking hyperspectral images, as all hyperspectral image
bands should be taken into account. We also study the impact of
watermarking in image quality, measured as usual by PSNR, but also
by the degradation of classification performance. Compression,
classification and watermarking are closely related to each other
as decisions taken in one subject have a large impact on the
others. Our results show that the newcomer JPEG2000 standard is a useful tool for both hyperspectral imaging and copyright protection
purposes. The proposed watermarking scheme, which takes advantage
of JPEG2000 standard capabilities, can be considered to be robust
under the constraints defined by the integration of hyperspectral
imaging with geographical information systems. JPEG2000 extensions
defined by the standard related to this work are also considered.
In this paper an empirical evaluation of the lossy compression
properties of the JPEG2000 standard for watermarking purposes is
performed. The JPEG2000 standard is used as a basic tool for
determining both how and where the embedded watermark should be
placed in the image. The original image is slightly modified in
order to generate a similar image (indistinguishable by the
observer), and the mark is embedded in the pixels presenting
differences between both images. Previous experiments show that
the properties of the resulting watermarking scheme depend
strongly on the transformation stage characteristics of the lossy
image compression system. Several parameters related to the
JPEG2000 standard are tested, in addition to the compression
ratio: the wavelet transform, block size, and the number of levels
of decomposition for each block. These parameters affect not only
the capacity but also the robustness of the watermarking scheme:
the number of different pixels between the original image and the
slightly modified one, and the distribution of such differences.
For evaluation purposes we use the Stirmark benchmark. We compare
the impact on system performance of each one of the JPEG2000
standard parameters, for several kinds of attacks, namely
filtering (including sharpening), JPEG lossy compression,
cropping, row and column removal, and a combination of rotation,
cropping and scaling.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.