Please use this identifier to cite or link to this item: http://hdl.handle.net/1893/29989
Appears in Collections:Computing Science and Mathematics Journal Articles
Peer Review Status: Refereed
Title: Embedding distortion analysis in wavelet-domain watermarking
Author(s): Bhowmik, Deepayan
Abhayaratne, Charith
Contact Email: deepayan.bhowmik@stir.ac.uk
Keywords: Security and privacy
Digital rights management
Issue Date: Jan-2020
Date Deposited: 15-Aug-2019
Citation: Bhowmik D & Abhayaratne C (2020) Embedding distortion analysis in wavelet-domain watermarking. ACM Transactions on Multimedia Computing, Communications and Applications, 15 (4), Art. No.: 108. https://doi.org/10.1145/3357333
Abstract: Imperceptibility and robustness are two complementary fundamental requirements of any watermarking algorithm. Low strength watermarking yields high imperceptibility, but exhibits poor robustness. High strength watermarking schemes achieve good robustness but often infuse distortions resulting in poor visual quality in host image. This paper analyses the embedding distortion for wavelet based watermarking schemes. We derive the relationship between distortion, measured in mean square error (MSE), and the watermark embedding modification and propose the linear proportionality between MSE and the sum of energy of the selected wavelet coefficients for watermark embedding modification. The initial proposition assumes the orthonormality of discrete wavelet transform. It is further extended for non-orthonormal wavelet kernels using a weighting parameter, that follows the energy conservation theorems in wavelet frames. The proposed analysis is verified by experimental results for both non-blind and blind watermarking schemes. Such a model is useful to find the optimum input parameters, including, the wavelet kernel, coefficient selection and subband choices for wavelet domain image watermarking. CCS Concepts: • Security and privacy → Digital rights management.
DOI Link: 10.1145/3357333
Rights: This item has been embargoed for a period. During the embargo please use the Request a Copy feature at the foot of the Repository record to request a copy directly from the author. You can only request a copy if you wish to use this work for your own research or private study. © ACM, 2019. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ACM Transactions on Multimedia Computing, Communications and Applications 15(4), article 108. https://doi.org/10.1145/3357333

Files in This Item:
File Description SizeFormat 
BA_EMBD_TOMM.pdfFulltext - Accepted Version913.71 kBAdobe PDFView/Open



This item is protected by original copyright



Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

The metadata of the records in the Repository are available under the CC0 public domain dedication: No Rights Reserved https://creativecommons.org/publicdomain/zero/1.0/

If you believe that any material held in STORRE infringes copyright, please contact library@stir.ac.uk providing details and we will remove the Work from public display in STORRE and investigate your claim.