Watermarking and Authentication in JPEG2000

Watermarking and Authentication in JPEG2000

V. E. Fotopoulos, I. D. Kostopoulos
Copyright: © 2009 |Pages: 26
DOI: 10.4018/978-1-60566-118-6.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter introduces JPEG 2000 as an application field for image authentication and the new technology of digital image watermarking. The new compression format has many unexplored characteristics that both the watermarking and the authentication communities should carefully take into account. Thus, a brief introduction to the standard is given at the beginning, discussing its structure, features, novelties, and capabilities. Following that introduction, watermarking techniques are presented, at first into the wavelet domain (the DWT is part of the JPEG2000 core), and then into the JPEG 2000 pipeline. The effects of the various standards’ parameters in this process are carefully investigated. Then, authentication mechanisms of JPEG 2000 images are described and we peek into JPSEC, part-8 of JPEG 2000 that deals with issues of watermarking and authentication.
Chapter Preview
Top

Jpeg2000: An Overview Of The Standard

The new standard has come to serve a wide variety of applications like the Internet, mobile communications, medical imagery, remote sensing, color facsimile, printing and scanning, digital photography, e-commerce, digital libraries and many more. Of course, each of these areas imposes certain requirements that the new standard should fulfil in the best possible way. So the implementation of JPEG2000 provides the following:

Complete Chapter List

Search this Book:
Reset