Share Email Print

Optical Engineering

Image watermarking through attack simulation
Author(s): Jiann-Shu Lee; Ching-Tsorng Tsai; Chao-Hui Ko
Format Member Price Non-Member Price
PDF $20.00 $25.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

One of the most significant requirements for a useful watermarking system is strong resistance to a variety of common attacks. Accordingly, the watermark embedding is designed from the attack perspective in this paper. We attempt to develop a new just-noticeable distortion (JND) in the discrete cosine transform (DCT) domain, based on an attack simulation scheme that reversely derives the maximum modification amount embedded in the DCT domain under a condition of imperceptibility. A new location selection approach to watermark embedding is also addressed. We evaluate the fitness of the embedding location by considering the embedding capacity, i.e., the JND of the considered frequency component, in addition to the frequency and the spectral strength, which are usually adopted by the existing methods. Experimental results show satisfactory ability of our method to resist various common attacks such as JPEG compression, smoothing, sharpening, cropping, and noise attacks.

Paper Details

Date Published: 1 February 2006
PDF: 11 pages
Opt. Eng. 45(2) 027001 doi: 10.1117/1.2167956
Published in: Optical Engineering Volume 45, Issue 2
Show Author Affiliations
Jiann-Shu Lee, National Huwei Institute of Technology (Taiwan)
Ching-Tsorng Tsai, Tunghai Univ. (Taiwan)
Chao-Hui Ko, Hsiuping Institute of Technology (Taiwan)

© SPIE. Terms of Use
Back to Top