Feature Points Based Image Watermarking with Insertions, Deletions and Substitutions Codes

Dieter Bardyn, Philippe Belet, Tim Dams, Ann Dooms, Peter Schelkens

Research output: Contribution to journalConference paper

Abstract

In this paper we concentrate on robust image watermarking (i.e. capable of resisting common signal processing operations and intentional attacks to destroy the watermark) based on image features. Kutter et al. motivated that well chosen image features survive admissible image distortions and hence can benefit the watermarking process. These image features are used as location references for the region in which the watermark is embedded. To realize the latter, we make use of previous work where a ring-shaped region, centered around an image feature is determined for watermark embedding. We propose to choose a specific sequence of image features according to strict criteria so that the image features have large distance to other chosen image features so that the ring shaped embedding regions do not overlap. Nevertheless, such a setup remains prone to insertion, deletion and substitution errors. Therefore we applied a two-step coding scheme similar to the one employed by Coumou and Sharma for speech watermarking. Our contribution here lies in extending Coumou and Sharma's one dimensional scheme to the two dimensional setup that is associated with our watermarking technique. The two-step coding scheme concatenates an outer Reed-Solomon error-correction code with an inner, blind, synchronization mechanism.
Original languageEnglish
Article number75410A
Number of pages12
JournalProceedings of SPIE
Volume7541
Publication statusPublished - 27 Jan 2010
EventIS&T/SPIE Electronic Imaging 2010 - San Jose, United States
Duration: 18 Jan 201019 Jan 2010

Keywords

  • digital watermarking
  • feature points
  • insertions deletions and substitutions codes
  • sparse quantization index modulation

Fingerprint

Dive into the research topics of 'Feature Points Based Image Watermarking with Insertions, Deletions and Substitutions Codes'. Together they form a unique fingerprint.

Cite this