When looked at as a communication task, the watermarking process can be split into three main steps: watermark generation and embedding (information transmission), possible attacks (transmission through the channel), and watermark retrieval (information decoding at the receiver side). We review the main issues in watermark generation and embedding. By focusing on the case of image watermarking, we first discuss the choice of the image features the watermark is superimposed to. Then we consider watermark generation and the rule used to insert the watermark within the host features. By adopting again a communication perspective, some useful hints are given on the way the watermark should be shaped and inserted within the host document for increased robustness against attacks. Given that invisibility is one of the main requirements a watermark must satisfy, the way psycho-visual notions can be used to effectively hide the watermark within an image is carefully reviewed. Rather than insisting on the mathematical aspects of each of the above issues, the main rationale behind the most commonly adopted approaches is given, as well as some illustrative examples

Barni, M., Podilchuk, C.I., Bartolini, F., & Delp, E.J. (2001). Watermark embedding: hiding a signal within a cover image. IEEE COMMUNICATIONS MAGAZINE, 39(8), 102-108 [10.1109/35.940048].

Watermark embedding: hiding a signal within a cover image

BARNI, MAURO;
2001

Abstract

When looked at as a communication task, the watermarking process can be split into three main steps: watermark generation and embedding (information transmission), possible attacks (transmission through the channel), and watermark retrieval (information decoding at the receiver side). We review the main issues in watermark generation and embedding. By focusing on the case of image watermarking, we first discuss the choice of the image features the watermark is superimposed to. Then we consider watermark generation and the rule used to insert the watermark within the host features. By adopting again a communication perspective, some useful hints are given on the way the watermark should be shaped and inserted within the host document for increased robustness against attacks. Given that invisibility is one of the main requirements a watermark must satisfy, the way psycho-visual notions can be used to effectively hide the watermark within an image is carefully reviewed. Rather than insisting on the mathematical aspects of each of the above issues, the main rationale behind the most commonly adopted approaches is given, as well as some illustrative examples
Barni, M., Podilchuk, C.I., Bartolini, F., & Delp, E.J. (2001). Watermark embedding: hiding a signal within a cover image. IEEE COMMUNICATIONS MAGAZINE, 39(8), 102-108 [10.1109/35.940048].
File in questo prodotto:
File Dimensione Formato  
00940048.pdf

non disponibili

Tipologia: Post-print
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 1.24 MB
Formato Adobe PDF
1.24 MB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: http://hdl.handle.net/11365/33571
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo