 Research
 Open Access
Blind image watermarking technique based on differential embedding in DWT and DCT domains
 Ali Benoraira^{1}Email author,
 Khier Benmahammed^{1} and
 Noureddine Boucenna^{1}
https://doi.org/10.1186/s1363401502395
© Benoraira et al. 2015
 Received: 9 December 2014
 Accepted: 8 June 2015
 Published: 3 July 2015
Abstract
This paper presents a new blind and robust image watermarking scheme based on discrete wavelet transform (DWT) and discrete cosine transform (DCT). Two DCTtransformed subvectors are used to embed the bits of the watermark sequence in a differential manner. The original subvectors are obtained by the subsampling of the approximation coefficients of the DWT transform of the host image. During the extraction stage, the simple difference between the corresponding subvectors of the watermarked image, gives directly the embedded watermark sequence. Experimental results demonstrate that the proposed technique successfully fulfills the requirement of imperceptibility and provides high robustness against a number of imageprocessing attacks, such as JPEG compression, noise adding, lowpass filtering, sharpening, and bitplane removal. Our scheme exhibits also an acceptable to good performance against some geometrical attacks such as resizing and cropping.
Keywords
 Blind watermarking
 Differential embedding
 DWT
 DCT
 Subsampling
1 Introduction
The process of embedding a watermark in a multimedia (image, audio, or video) object is termed as digital watermarking. Content providers want to embed watermarks in their multimedia objects (digital content) for several reasons like copyright protection, content authentication, tamper detection, etc [1–3]. More and more researchers are particularly attracted to the area of image watermarking because of the property of the image as it has a lot of redundant information contained in it which can be exploited to be used for watermark embedding. The embedding process is guided by the use of a secret key which decides the locations within the image where the watermark would be embedded. When the owner wants to check the watermarks in the possibly attacked and distorted digital images, s/he relies on the secret key that was used to embed the watermark. Using the secret key, the embedded watermark sequence can be extracted. In order to be successful, the watermark should be invisible and robust against common image processing operations such as additive noise, compression, cropping, filtering, and resizing [2]. If the watermark is placed in perceptually significant coefficients of the image, the robustness against image distortion is better achieved. These coefficients do not change much after common image processing and compression operations. Also, if these coefficients are destroyed, the reconstructed image is different from the original image and the digital watermark becomes irrelevant. Although, embedding the watermark in perceptually significant coefficients could alter the perceived visual quality of the image. Thus, two essential prerequisites for a powerful watermarking scheme, robustness and invisibility, conflict with each other [4].
Watermarking techniques can be broadly categorized into two distinct categories: nonblind or blind depending on whether the original image is necessary for watermark extraction or not. In realworld practices, nonblind watermarking algorithms are unsuitable for many practical applications in that they require the nonwatermarked data to be presented during extraction or detection [2].
Watermarking techniques can be also classified according to the domain in which the watermark is embedded, i.e., the spatial domain or the transform domain. While the spatial domain techniques are having least complexity and high payload, they can not withstand image compression and other common image processing attacks [2, 3]. Transform domain watermarking schemes like those based on the discrete Fourier transform (DFT) [5], the discrete cosine transform (DCT) [6], and the discrete wavelet transform (DWT) [7, 8] typically provide higher image imperceptibility and are much more robust to image manipulations. However, DWT has been used more frequently in digital image watermarking due to its time/frequency decomposition characteristics, which resemble to the theoretical models of the human visual system [8].
Further performance improvements in DWTbased digital image watermarking methods could be obtained by jointing DWT with other transformation domain so that effective watermarking approaches could be developed [9–16].
An algorithm based on joint DWT and DFT transform is proposed in [9]. In the DWT domain, a spread spectrumbased watermark is embedded in the coefficients of the LL subband while in DFT domain a template is embedded in the middle frequency component.
Zhao et al. proposed a watermarking approach implemented as a DCTDWT dual domain algorithm and applied for the protection and compression of cultural heritage imagery [10]. They employed Haar DWT domain to embed the watermark in the components of the image that are of perceptual significance. These components are identified using a blockbased (DCT) transform. They specifically demonstrated that watermark embedding in the Haar DWT domain does not interfere with watermark generation in the DCT domain.
In the algorithm proposed in [11], the watermarking was carried out through the embedding of the watermark in the first and secondlevel DWT subbands of the host image followed by the application of DCT on a selected DWT coefficient sets. It has been shown that the combination of the two transforms improved the watermarking performance considerably when compared to the DWTonly watermarking approach.
In [12], the authors proposed a watermarking scheme based on adaptive quantization index modulation and SVD in a hybrid DWT and DCT domain. The watermark bits are embedded in the singular values’ vector of blocks within low frequency subband in host image hybrid DWTDCT domain. To embed the watermark imperceptibly and robustly, they model the adaptive quantization steps by utilizing human visual system (HVS) characteristics and PSO algorithm.
In [13], Feng et al. have proposed a blind DWTDCT watermarking approach. After scrambling the binary watermark, a blockbased DCT transform of the firstlevel DWT LL subband is computed and two PNsequences of the watermark bits are embedded in the mid frequency coefficients of the corresponding DCT blocks. In the extraction process, the same steps as the embedding process is used to extract the DCT middle frequencies of the LL subband. Finally, correlation between midband coefficients and PNsequences is calculated to determine the watermarked bits.
A similar approach is presented in [14], where a multiple subbands of the thirdlevel DWT transform of a host image are used to insert the watermark instead of the firstlevel LL subband.
In the method proposed in [16], the wavelet firstlevel LL subband and the watermark image are transformed using DCT and SVD. The S vector of watermark information is embedded in the S component of the host image. Watermarked image is generated by inverse SVD on modified S vector and original U, V vectors followed by inverse DCT and inverse DWT.
Our method is also linked to schemes that use the subsampling of the image data [6, 15, 17, 18]. The subsampling techniques offer more room for watermarking by, for example, dividing the original image into subimages and applying different modifications to transformed coefficients belonging to different subimages [6, 17].
In this paper, a binary watermark sequence is embedded in the host image using DWT and DCT domains and the technique of differential embedding. The DCT is applied on two subvectors obtained by the subsampling of the DWT LL subband of the image. The differential embedding of the watermark in the resulting two DCTtransformed subvectors ensures the blind extraction of it.
To further emphasize the efficiency of combining DWT and DCT domains, we propose also a reduced DCTbased version of our method which is based on the DCT domain only. The results of comparison between the combined DWTDCT and the DCTonly methods justify the combining of DWT and DCT domains.
The rest of the paper is structured as follows. In Section 2, we present the new DWTDCT blind watermarking scheme. The reduced DCTonly method is outlined in Section 3. Numerical experimental results and comparisons with other methods are given in Section 4. Finally, we draw conclusion and suggest future work in Section 5.
2 Proposed method
2.1 The embedding process

Step 1: Perform the firstlevel DWT of the input image I. This produces the approximation coefficients matrix (LL subband) and a set of detail coefficients (H L,L H, and HH subbands).

Step 2: Perform zigzag scanning [19] to convert the matrix LL into a vector of approximation coefficients x(n), n=1,…,N, where N=M.M/4. Since adjacent pixels are highly correlated in real images and the firstlevel LL subband represents a close approximation of the original image (Fig. 2); the zigzag scanning of the LL matrix helps to cluster high correlated approximation coefficients in the vector x(n).

Step 3: Decompose the vector of approximation coefficients x into two (correlated) subvectors x _{1} and x _{2} using the following subsampling operations:$$\begin{array}{*{20}l} x_{1}(k)&=x(2k) \end{array} $$(1)$$\begin{array}{*{20}l} x_{2}(k)&=x(2k1) \end{array} $$(2)
where k=1,…,N/2.

Step 4: Perform DCT on x _{1} and x _{2} to produce their DCTtransformed versions X _{1} and X _{2} (Fig. 3):$$\begin{array}{*{20}l} X_{1}&=dct(x_{1}) \end{array} $$(3)$$\begin{array}{*{20}l} X_{2}&=dct(x_{2}) \end{array} $$(4)

Step 5: Insert the watermark sequence bits W(i) for i=0,2,…,L−1, in the transformed subvectors X _{1} and X _{2} using a differential embedding technique. This will produce two transformed and modified (by watermarking) subvectors \(\hat {X}_{1}\) and \(\hat {X}_{2}\) as follows:
$$ \hat{X}_{1}(i^{\prime})=\frac{1}{2}\left[X_{1}\left(i^{\prime}\right)+X_{2}\left(i^{\prime}\right)\right]+\alpha W\left(i\right) $$(5)$$ \hat{X}_{2}(i^{\prime})=\frac{1}{2}\left[X_{1}\left(i^{\prime}\right)+X_{2}\left(i^{\prime}\right)\right]\alpha W\left(i\right) $$(6)where α is the gain factor and i ^{′} are the random locations within the high energy band of X _{1} and X _{2} in which the watermark bits are embedded (Fig. 4). These locations are the elements of a vector r which can be generated using a random permutation function:$$\begin{array}{*{20}l} i^{\prime}&=r(i) \end{array} $$(7)$$\begin{array}{*{20}l} r&=\text{RandPerm}(S,a,b) \end{array} $$(8)where S is the seed of the associated pseudo random number generator (PNRG), a and b are, respectively, the starting and the ending locations of the high energy band used to insert the watermark (Fig. 4). Therefore, the user’s secret key is k e y=(S,a,b), which prevent the watermark from tempering or unauthorized access by attackers.

Step 6: Perform the inverse DCT on \(\hat {X}_{1}\) and \(\hat {X}_{2}\):$$\begin{array}{*{20}l} \hat{x}_{1}&=idct(\hat{X}_{1}) \end{array} $$(9)$$\begin{array}{*{20}l} \hat{x}_{2}&=idct(\hat{X}_{2}) \end{array} $$(10)

Step 7: Combine the two modified subvectors \(\hat {X}_{1}\) and \(\hat {X}_{2}\) using the opposite operation in (1) and (2) in order to produce the modified vector of approximation coefficients \(\hat {x}\):$$\begin{array}{*{20}l} \hat{x}(2k)&=\hat{x}_{1}(k) \end{array} $$(11)$$\begin{array}{*{20}l} \hat{x}(2k1)&=\hat{x}_{2}(k) \end{array} $$(12)
for k=1,…,N/2.

Step 8: Convert the modified vector \(\hat {x}\) into the matrix of a modified approximation coefficients \(\widehat {LL}\) using the inverse of the zigzag scan operation used instep 2.

Step 9: Construct the watermarked image \(\hat {I}\) by performing the inverse wavelet transform of the modified approximation coefficients \(\widehat {LL}\) and the sets of original detail coefficients (H L,L H, and HH subbands).

Note 1: The parameters a and b should be chosen to satisfy the following conditions:

a>0: the DCcomponents of the transformed subvectors X _{1} and X _{2} must remain unchanged in order to preserve the quality of the watermarked image;

b−a≥L: the insertion band have to be wide enough to insert all the watermark’s bits;

\(b\leq \frac {N}{2}\): the watermarking is done in the hight energy band of X _{1} and X _{2} in order to guarantee the robustness of the method.


Note 2: While the normal differential embedding would be as follows: \(\hat {X}_{1}=X_{1}+\alpha W\) and \(\hat {X}_{2}=X_{2}\alpha W\) (by omitting the insertion locations), the fact that the transformed subvectors X _{1} and X _{2} are highly correlated (as shown in Fig. 5) allow as to assume in Eqs. 5 and 6, that \(X_{1}\boldsymbol {\approx } X_{2}\boldsymbol {\approx }\frac {1}{2}\left [X_{1}+X_{2}\right ]\). This will ensure that X _{1} and X _{2} are equally contributing in the new modified ones \(\hat {X}_{1}\) and \(\hat {X}_{2}\) so that the resulting distortion on the watermarked image will be minimal. Also, it is obvious that the difference between \(\hat {X}_{1}\) and \(\hat {X}_{2}\) will give an amplified (by 2) amount of the inserted watermark sequence ( α W) which is the key feature of this differential embedding technique.
2.2 The extraction process
If the watermarked image has been attacked, the proposed method is able to extract the watermark and the quality of extraction closely depends on the severity of the attack as shown in the experiments.
Notice that no threshold setting is needed at the extraction stage, which represents a great advantage compared with a lot of schemes in literature [9, 10]. Also, this watermarking approach is analogous to the technique of Differential Signaling, a method of transmitting information electrically by means of two complementary signals [20]. At the end of the connection, the receiver reads the difference between the two signals to recover the original information.
3 The DCTonly method
In this process, the operations are the same as described in the embedding process of the DWTDCT method (Section 2.1). Notice that all the vectors in Fig. 7 are four times the size of the corresponding vectors in the DWTDCT method. The extraction process will be the same as in Fig. 6 except that the DWT step is not needed in this case.
4 Experiment results
where ⊕ is the XOR operator. If the watermark is extracted without error the BCR value will be 100 %.
4.1 Gain factor selection
It is apparent from Fig. 8 that higher α values make lower PSNR of the watermarked images, but the similarity (BCR %) of original watermark and the extracted watermark gets better for higher values of α. The best tradeoff between visual quality and watermark robustness is achieved for the values of α in range from 0.2 to 0.3 where the PSNR values are greater than 40 dB and the BCR values are almost 100 % for all test images. In the rest of our experiments, we will set α= 0.2 as the default gain factor value.
4.2 Robustness tests
4.2.1 4.2.1 Robustness against image compression
We can see from Fig. 11 a that the watermark is completely recovered under high strength JPEG lossy attacks (BCR = 100 for Q≥40) for all test images.
4.2.2 4.2.2 Robustness against image processing attacks
BCR values of the proposed DWTDCT technique under noise addition attacks
Attack  Image  

Baboon  Bridge  Jetplane  Peppers  Pirate  
Gaussian noise  98.8  99.1  98.5  98.9  98.3 
(var = 0.005)  
Gaussian noise  93.5  93.4  93.7  93.6  94.1 
(var = 0.01)  
Salt and pepper  99.9  99.7  99.7  99.4  99.8 
noise (var = 0.01)  
Salt and pepper  98.1  97.7  97.2  97.1  97.5 
noise (var = 0.02)  
Speckle noise  99.9  100  98.4  100  100 
(var = 0.01)  
Speckle noise  98.2  98.4  93.5  98.8  99.2 
(var = 0.02) 
BCR values of the proposed DWTDCT technique under lowpass filtering attacks
Attack  Image  

Baboon  Bridge  Jetplane  Peppers  Pirate  
Average filter  99.7  100  100  100  100 
(3 ×3)  
Gaussian filter  90.4  91.2  93.3  88.8  92.5 
(5 ×5) var = 1.5  
Gaussian filter  99.8  99.9  99.9  99.6  100 
(5 ×5) var = 1  
Median filter  97.9  99.6  99.9  99.8  100 
(3 ×3)  
Wiener filter  99.6  99.9  99.9  99.9  99.9 
(3 ×3) 
BCR values of the proposed DWTDCT technique under other imageprocessing attacks
Attack  Image  

Baboon  Bridge  Jetplane  Peppers  Pirate  
Bitplane  100  99.7  99.2  100  100 
removal (5 bits)  
Bitplane  98.0  92.4  96.7  98.4  96.5 
removal (6 bits)  
Gamma  100  100  100  100  100 
correction (0.5)  
Gamma  100  100  100  100  100 
correction (1.5)  
Histogram  100  100  99.5  100  100 
equalization  
Laplacian  100  100  100  100  100 
sharpening 
Figure 12 shows the visual impact of some attacks on different images. The watermark is extracted with BCR value greater than 99 % which confirms the preceding results.
4.2.3 4.2.3 Robustness against geometrical attacks
The next experiments show the robustness against some geometrical attacks on the test images.
BCR values of the proposed DWTDCT technique under geometrical attacks
Attack  Image  

Baboon  Bridge  Jetplane  Peppers  Pirate  
Resizing  98.6  99.7  100  100  100 
(512→256→512)  
Resizing  77.1  84.4  96.4  97.3  93.8 
(512→200→512)  
Rotation (0.25°)  78.3  87.6  97.7  99.3  97.3 
Rotation (0.5°)  54.3  56.1  56.4  56.1  57.4 
Surrounding  97.4  99.6  97.6  99.5  99.8 
crop (15 %)  
Surrounding  94.2  97.3  97.2  99.2  99.2 
crop (25 %) 
4.2.4 4.2.4 Robustness against watermark suppression attack
4.3 Comparison with other methods
In this subsection, we conduct several experiments to compare the performance of the proposed DWTDCT method with two other blind watermarking approaches ([13] and [25]) and also with the reduced DCTonly method.
Attack  Method  

Feng et al. [13]  Lin et al. [25]  DCTonly  DWTDCT  
Bitplane  96.3  85.9  100  100 
removal (5 bits)  
Gamma  99.2  76.1  100  100 
correction (3)  
Gaussian  87.5  79.5  96.3  94.9 
noise (0.01)  
Histogram  99.3  94.5  100  100 
equalization  
Laplacian  100  91.4  100  100 
sharpening  
Median  97.1  99.2  41.6  100 
filter (3 ×3)  
Gaussian  98.8  94.5  83.4  100 
filter (5 ×5)  
Salt and pepper  93.3  85.9  99.1  98.3 
noise (0.02) 

 The proposed DWTDCT method outperforms the reduced DCTonly method for JPEG compression, lowpass filtering, resizing, and rotation attacks. For the rest of attacks, both techniques perform equally well. Consequently, the combination of the two transforms (DWT and DCT) is more practically helpful than the use of one domain only (DCT) especially if the watermarked images are intended to undergo these types of attacks.

 For JPEG compression, only the method in [25] performs slightly better than the proposed DWTDCT method. This is because the fact that wavelet quantization techniques are generally robust against image compression attacks [25].

 For the rest of attacks, the proposed DWTDCT method is more robust than the two methods in [13] and [25] especially for bitplane removal, gamma correction, noise addition, and for all geometrical attacks.
From the previous results, we may conclude that, overall, the proposed method has a better performance than the compared watermarking schemes ([13, 25]) and that the combination of the DWT and DCT domains is more advantageous than the use of only one frequency domain.
5 Conclusions
In this paper, a robust, yet simple watermarking scheme based on the combination of DWT and DCT domains is presented. In the embedding process, a differential technique is performed on two transformed subvectors so that the extraction of the watermark is achieved using only the difference of the corresponding watermarked subvectors.
Overall, the experimental results demonstrate that our scheme provides excellent robustness against multiple image attacks such as bitplan removal, cropping, JPEG compression, histogram equalization, lowpass filtering, and noise adding attacks. Besides, the quality of the watermarked image is satisfactory in terms of imperceptibility as the PSNR per watermarked image is over 42 dB.
We have also investigated the utility of the combination of the DWT and DCT transforms through the proposition of a relaxed version of our method based only on the DCT transform. In comparison, the DWTDCT method is more robust than the DCTonly method for a set of attacks such as JPEG compression and lowpass filtering. The results of experiments have showed also that the proposed (DWTDCT) method has stronger robustness in comparison with two existing watermarking schemes.
As a future work, we plan to extend the proposed approach to video watermarking domain. As the embedding and the extracting processes are of low complexity and do not require any specific features of the input image, the extension to video watermarking will be straightforward. Along with that, an automatic technique for the selection of the gain factor value needs to be developed to have better control on both imperceptibility and robustness of the scheme.
6 Endnote
^{1} All test images are obtained from the USCSIPI Image Database: http://sipi.usc.edu/database/.
Declarations
Authors’ Affiliations
References
 VM Potdar, S Han, E Chang, in International Conference on Industrial Informatics. A Survey of Digital Image Watermarking Techniques, (2005), pp. 709–716. doi:10.1109/INDIN.2005.1560462.Google Scholar
 I Cox, M Miller, J Bloom, J Fridrich, T Kalker, Digital Watermarking and Steganography, 2nd edn. (Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2008).Google Scholar
 M Abdullatif, AM Zeki, J Chebil, TS Gunawan, in International Colloquium on Signal Processing and Its Applications. Properties of Digital Image Watermarking (IEEEKL, Malaysia, 2013), pp. 235–240. doi:10.1109/CSPA.2013.6530048.Google Scholar
 P Moulin, JA O’Sullivan, Informationtheoretic analysis of information hiding. IEEE T. Inform. Theory. 49, 563–593 (2003). doi:10.1109/TIT.2002.808134.MathSciNetView ArticleGoogle Scholar
 CM Pun, in International Conference on Signal Processing, 2. A Novel DFTbased Digital Watermarking System for Images, (2006), pp. 16–20. doi:10.1109/ICOSP.2006.345581.Google Scholar
 WC Chu, DCTbased image watermarking using subsampling. IEEE T. Multimedia. 5, 34–38 (2003). doi:10.1109/TMM.2003.808816.View ArticleGoogle Scholar
 CV Serdean, MK Ibrahim, A Moemeni, MM AlAkaidi, Wavelet and multiwavelet watermarking. IET Image Process. 48, 223–230 (2007). doi:10.1049/ietipr:20060214.View ArticleGoogle Scholar
 MR Keyvanpour, FM Bayat, Robust dynamic blockbased image watermarking in DWT domain. Procedia CS. 3, 238–242 (2011). doi:10.1016/j.procs.2010.12.040.Google Scholar
 X Kang, J Huang, YQ Shi, Y Lin, A DWTDFT composite watermarking scheme robust to both affine transform and jpeg compression. IEEE T. Circ. Syst. Vid. 13, 776–786 (2003). doi:10.1109/TCSVT.2003.815957.View ArticleGoogle Scholar
 Y Zhao, P Campisi, D Kundur, Dual domain watermarking for authentication and compression of cultural heritage images. IEEE T. Image Process. 13, 430–448 (2004). doi:10.1109/TIP.2003.821552.View ArticleGoogle Scholar
 A AIHaj, Combined DWTDCT digital image watermarking. J. Comput. Sci. 3, 740–746 (2007). doi:10.3844/jcssp.2007.740.746.View ArticleGoogle Scholar
 S Zhu, J Liu, in Lect. Notes Comput. Sc, 5451. A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization, (2009), pp. 136–146. doi:10.1007/9783642008436_13.Google Scholar
 LP Feng, LB Zheng, P Cao, in 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), 7. A DWTDCT Based Blind Watermarking Algorithm for Copyright Protection, (2010), pp. 455–458. doi:10.1109/ICCSIT.2010.5565101.Google Scholar
 RH Laskar, M Choudhury, K Chakraborty, S Chakraborty, in Computer Networks and Intelligent Computing. Communications in Computer and Information Science, 157. A Joint DWTDCT Based Robust Digital Watermarking Algorithm for Ownership Verification of Digital Images (SpringerBerlin, Germany, 2011), pp. 482–491. doi:10.1007/9783642227868_61.Google Scholar
 MJ Tsai, HY Hung, in 24th International Conference on Distributed Computing Systems Workshops. DCT and DWT Based Image Watermarking Using Sub Sampling (China, 2004), pp. 184–189. doi:10.1109/ICDCSW.2004.1284029.Google Scholar
 AK Singh, M Dave, A Mohan, Hybrid Technique for Robust and Imperceptible Image Watermarking in DWT–DCT–SVD Domain. Natl. Acad. Sci. Lett. 37, 351–358 (2014). doi:0.1007/s4000901402418.View ArticleGoogle Scholar
 PW Lin, YH Chen, CC Chang, JS Lee, Contrastadaptive removable visible watermarking (CARVW) mechanism. Image and Vision Computing. 31, 311–321 (2013). doi:10.1016/j.imavis.2013.02.002.View ArticleGoogle Scholar
 W Lu, W Sun, H Lu, Novel robust image watermarking based on subsampling and DWT. Multimedia Tools and Applications. 60, 31–46 (2012). doi:10.1007/s1104201107941.View ArticleGoogle Scholar
 G Bhatnaga, QM Jonathan Wu, A new robust and efficient multiple watermarking scheme. Multimed. Tools Appl. (2013). doi:10.1007/s1104201316818.Google Scholar
 H Johnson, M Graham, High Speed Signal Propagation: Advanced Black Magic (Prentice Hall, 2003).Google Scholar
 F Yaghmaee, M Jamzad, Estimating watermarking capacity in gray scale images based on image complexity. EURASIP J. Adv. Signal Process. (2010). doi:10.1155/2010/851920.Google Scholar
 HC Huang, SC Chu, JS Pan, CY Huang, BY Liao, Tabu search based multiwatermarks embedding algorithm with multiple description coding. Inf. Sci. 181, 3379–3396 (2011). doi:10.1016/j.ins.2011.04.007.View ArticleGoogle Scholar
 G Qadir, Z Xi, ATS Ho, in Optics, Photonics, and Digital Technologies for Multimedia Applications. SPIE Proceedings, 7723. Estimating jpeg2000 compression for image forensics using Benford’s law (Brussels, Belgium, 2010). doi:10.1117/12.855085.Google Scholar
 K Roimela, T Aarnio, J Itäranta, in Proceedings of the 2008 Symposium on Interactive 3D Graphics and Games. I3D ’08. Efficient high dynamic range texture compression (ACMNew York, NY, USA, 2008), pp. 207–214. doi:10.1145/1342250.1342282. http://doi.acm.org/10.1145/1342250.1342282.
 WH Lin, SJ Horng, TW Kao, P Fan, CL Lee, Y Pan, An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans. on Multim. 10, 746–757 (2008). doi:10.1109/TMM.2008.922795.View ArticleGoogle Scholar
Copyright
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.