Share Email Print

Proceedings Paper

Nested object watermarking
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Annotation watermarking is an application of watermarking where information about a cover or a part thereof are embedded in the cover itself to link both directly together. In earlier work we introduced Nested Object Annotation Watermarking as a special case, where the semantic, shape and hierarchical relations between the depicted nested objects are embedded in the area of each object only. As these regions can be anywhere and may be composed of any shape there is very limited a-priori knowledge for synchronization, which results in a higher complexity and ultimately in a higher error-proneness. In general an exhaustive search strategy for the proper blocks to reconstruct the shape suffers from the intrinsic combinatorial explosion of this process. Therefore in earlier work, at first we focused on rectangular embedding schemes with a block luminance algorithm, a steganographic WetPaperCode algorithm, a rectangular and finally a polygonal Dual-Domain DFT algorithm. In this paper we review and compare these algorithms in terms of their transparency, capacity, shape fidelity and robustness against the selected aspects JPEG compression and cropping. For the DFT algorithm we also show the influence of several parameters, present our idea of a method to reduce the combinatorial explosion by collating the paths in the search tree, and show that our new synchronization approach surpasses our former rectangular method in terms of correct retrievals, despite its higher complexity.

Paper Details

Date Published: 4 February 2009
PDF: 12 pages
Proc. SPIE 7254, Media Forensics and Security, 725416 (4 February 2009); doi: 10.1117/12.805862
Show Author Affiliations
Claus Vielhauer, Univ. of Magdeburg (Germany)
Univ. of Applied Sciences in Brandenburg (Germany)
Maik Schott, Univ. of Magdeburg (Germany)
Jana Dittmann, Univ. of Magdeburg (Germany)

Published in SPIE Proceedings Vol. 7254:
Media Forensics and Security
Edward J. Delp III; Jana Dittmann; Nasir D. Memon; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?