Share Email Print

Proceedings Paper

Feature point based image watermarking with insertions, deletions, and substitution codes
Author(s): Dieter Bardyn; Philippe Belet; Tim Dams; Ann Dooms; Peter Schelkens
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

In this paper we concentrate on robust image watermarking (i.e. capable of resisting common signal processing operations and intentional attacks to destroy the watermark) based on image features. Kutter et al.7 motivated that well chosen image features survive admissible image distortions and hence can benefit the watermarking process. These image features are used as location references for the region in which the watermark is embedded. To realize the latter, we make use of previous work16 where a ring-shaped region, centered around an image feature is determined for watermark embedding. We propose to choose a specific sequence of image features according to strict criteria so that the image features have large distance to other chosen image features so that the ring shaped embedding regions do not overlap. Nevertheless, such a setup remains prone to insertion, deletion and substitution errors. Therefore we applied a two-step coding scheme similar to the one employed by Coumou and Sharma4 for speech watermarking. Our contribution here lies in extending Coumou and Sharma's one dimensional scheme to the two dimensional setup that is associated with our watermarking technique. The two-step coding scheme concatenates an outer Reed-Solomon error-correction code with an inner, blind, synchronization mechanism.

Paper Details

Date Published: 27 January 2010
PDF: 12 pages
Proc. SPIE 7541, Media Forensics and Security II, 75410A (27 January 2010); doi: 10.1117/12.838598
Show Author Affiliations
Dieter Bardyn, Vrije Univ. Brussel (Belgium)
Philippe Belet, Artesis Univ. College of Antwerp (Belgium)
Tim Dams, Artesis Univ. College of Antwerp (Belgium)
Ann Dooms, Vrije Univ. Brussel (Belgium)
Peter Schelkens, Vrije Univ. Brussel (Belgium)

Published in SPIE Proceedings Vol. 7541:
Media Forensics and Security II
Nasir D. Memon; Jana Dittmann; Adnan M. Alattar; Edward J. Delp III, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?