Paper
9 April 1999 OCTALIS benchmarking: comparison of four watermarking techniques
Laurent Piron, Michael Arnold, Martin Kutter, Wolfgang Funk, Jean Marc Boucqueau, Fiona Craven
Author Affiliations +
Proceedings Volume 3657, Security and Watermarking of Multimedia Contents; (1999) https://doi.org/10.1117/12.344673
Event: Electronic Imaging '99, 1999, San Jose, CA, United States
Abstract
In this paper, benchmarking results of watermarking techniques are presented. The benchmark includes evaluation of the watermark robustness and the subjective visual image quality. Four different algorithms are compared, and exhaustively tested. One goal of these tests is to evaluate the feasibility of a Common Functional Model (CFM) developed in the European Project OCTALIS and determine parameters of this model, such as the length of one watermark. This model solves the problem of image trading over an insecure network, such as Internet, and employs hybrid watermarking. Another goal is to evaluate the resistance of the watermarking techniques when subjected to a set of attacks. Results show that the tested techniques do not have the same behavior and that no tested methods has optimal characteristics. A last conclusion is that, as for the evaluation of compression techniques, clear guidelines are necessary to evaluate and compare watermarking techniques.
© (1999) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Laurent Piron, Michael Arnold, Martin Kutter, Wolfgang Funk, Jean Marc Boucqueau, and Fiona Craven "OCTALIS benchmarking: comparison of four watermarking techniques", Proc. SPIE 3657, Security and Watermarking of Multimedia Contents, (9 April 1999); https://doi.org/10.1117/12.344673
Lens.org Logo
CITATIONS
Cited by 12 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Image quality

Visualization

Image compression

Image processing

Performance modeling

Resistance

RELATED CONTENT

Data hiding technique in JPEG compressed domain
Proceedings of SPIE (August 01 2001)
Analysis of a wavelet-based robust hash algorithm
Proceedings of SPIE (June 22 2004)
Reversible digital images
Proceedings of SPIE (April 09 1999)

Back to Top