An Improved Self-Embedding Algorithm: A Robust Protection against Lossy Compression Attacks in Digital Image Watermarking

Pratheepan Yogarajah, Joan Condell, Kevin Curran, Paul McKevitt, Abbas Cheddad

Research output: Contribution to journalArticle

Abstract

Watermarking is the process of embedding watermark into an image such that embedded watermark can be extracted later. Lossy compression attacks in digital watermarking are one of the major issues in digital watermarking. Cheddad et al. proposed a robust secured self-embedding method which is resistant to a certain amount of JPEG compression. Our experimental results show that the self-embedding method is resistant to JPEG compression attacks and not resistant to other lossy compression attacks such as Block Truncation Coding (BTC) and Singular Value Decomposition (SVD). Therefore we improved Cheddad et al’s. method to give better protection against BTC and SVD compression attacks.
LanguageEnglish
Pages47-59
JournalImage Processing and Communications
Volume15
Issue number1
Publication statusPublished - 1 Dec 2010

Fingerprint

Image watermarking
Digital watermarking
Singular value decomposition
Watermarking

Cite this

@article{2a06ac599aeb4208a4f9dbfc76ce5aeb,
title = "An Improved Self-Embedding Algorithm: A Robust Protection against Lossy Compression Attacks in Digital Image Watermarking",
abstract = "Watermarking is the process of embedding watermark into an image such that embedded watermark can be extracted later. Lossy compression attacks in digital watermarking are one of the major issues in digital watermarking. Cheddad et al. proposed a robust secured self-embedding method which is resistant to a certain amount of JPEG compression. Our experimental results show that the self-embedding method is resistant to JPEG compression attacks and not resistant to other lossy compression attacks such as Block Truncation Coding (BTC) and Singular Value Decomposition (SVD). Therefore we improved Cheddad et al’s. method to give better protection against BTC and SVD compression attacks.",
author = "Pratheepan Yogarajah and Joan Condell and Kevin Curran and Paul McKevitt and Abbas Cheddad",
year = "2010",
month = "12",
day = "1",
language = "English",
volume = "15",
pages = "47--59",
number = "1",

}

An Improved Self-Embedding Algorithm: A Robust Protection against Lossy Compression Attacks in Digital Image Watermarking. / Yogarajah, Pratheepan; Condell, Joan; Curran, Kevin; McKevitt, Paul; Cheddad, Abbas.

Vol. 15, No. 1, 01.12.2010, p. 47-59.

Research output: Contribution to journalArticle

TY - JOUR

T1 - An Improved Self-Embedding Algorithm: A Robust Protection against Lossy Compression Attacks in Digital Image Watermarking

AU - Yogarajah, Pratheepan

AU - Condell, Joan

AU - Curran, Kevin

AU - McKevitt, Paul

AU - Cheddad, Abbas

PY - 2010/12/1

Y1 - 2010/12/1

N2 - Watermarking is the process of embedding watermark into an image such that embedded watermark can be extracted later. Lossy compression attacks in digital watermarking are one of the major issues in digital watermarking. Cheddad et al. proposed a robust secured self-embedding method which is resistant to a certain amount of JPEG compression. Our experimental results show that the self-embedding method is resistant to JPEG compression attacks and not resistant to other lossy compression attacks such as Block Truncation Coding (BTC) and Singular Value Decomposition (SVD). Therefore we improved Cheddad et al’s. method to give better protection against BTC and SVD compression attacks.

AB - Watermarking is the process of embedding watermark into an image such that embedded watermark can be extracted later. Lossy compression attacks in digital watermarking are one of the major issues in digital watermarking. Cheddad et al. proposed a robust secured self-embedding method which is resistant to a certain amount of JPEG compression. Our experimental results show that the self-embedding method is resistant to JPEG compression attacks and not resistant to other lossy compression attacks such as Block Truncation Coding (BTC) and Singular Value Decomposition (SVD). Therefore we improved Cheddad et al’s. method to give better protection against BTC and SVD compression attacks.

M3 - Article

VL - 15

SP - 47

EP - 59

IS - 1

ER -