a survey of wavelet domain watermarking algorithms
play

A Survey of Waveletdomain Watermarking Algorithms Dept. of - PowerPoint PPT Presentation

A Survey of Waveletdomain Watermarking Algorithms Dept. of Scientific Computing, University of Salzburg, Austria motivation & classification approximation image and detail subband characteristics relationship to compression and


  1. A Survey of Wavelet−domain Watermarking Algorithms Dept. of Scientific Computing, University of Salzburg, Austria motivation & classification approximation image and detail subband characteristics relationship to compression and JPEG2000

  2. Why wavelet−domain watermarking? robustness allows to mark significant image components advantages due to transform structure space−frequency localization multi−resolution representation adaptivity compatibility with JPEG2000 standard

  3. The wavelet transform domain successive low−pass / high−pass filtering steps approximation image detail subbands multi−resolution representation

  4. Wavelet−domain watermarking extensive research [Dugelay] Watermarking publications 300 275 250 225 Number of papers 200 175 Wavelet related 150 Other 125 100 75 50 25 0 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 Year

  5. Classification of schemes decomposition strategy number of levels, adaptivity, packet basis coefficient selection approximation image or detail subbands? embedding and extraction method additive or quantization strategy HVS modelling implicit or explicit

  6. � � Approximation image watermarking first algorithm [ORuanaidh96] and early schemes, e.g. [Corvi97] general low−frequency marking, e.g. [Tzovaras98], [Liang]

  7. � � Detail subband embedding Laplacian coefficient distribution large coefficients correspond to edges, texture

  8. Difference images created with algorithms by [Corvi97] and [Xia98]

  9. Relationship to image compression duality between compression and watermarking can use the same HVS model just−noticable difference (JND) paradigm quantization visibility [Watson97] watermarking can exploit visual masking

  10. Relationship to image compression similar coding techniques MTWC [Wang98] zero−tree coding [Inoue98] EBCOT [Su99]

  11. Compatibility with JPEG2000 cheap devices require integrated coding and watermarking versatile wavelet−based image coder independent processing of image blocks, EBCOT [Taubman99]

  12. PSNR gap

  13. Correlation

  14. � � � Conclusion investigate JPEG2000 coding process for watermarking look at color images and HVS model applications & security

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend