<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Watermarking algorithms for JPEG 2000 lossy compressed images</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>V Fedoseev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>T Androsova</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Image Processing Systems Institute of RAS - Branch of the FSRC "Crystallography and Photonics" RAS</institution>
          ,
          <addr-line>Molodogvardejskaya street 151, Samara, Russia, 443001</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Samara National Research University</institution>
          ,
          <addr-line>Moskovskoe Shosse 34А, Samara, Russia, 443086</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2019</year>
      </pub-date>
      <fpage>366</fpage>
      <lpage>370</lpage>
      <abstract>
        <p>In the paper, we propose two watermarking algorithms for semi-fragile data hiding in JPEG 2000 lossy compressed images. Both algorithms are based on the concept of quantization index modulation. These methods have a property of semi-fragility to the image quality. It means that the hidden information is preserved after high-quality compression, and is destroyed in the case of significant degradation. Experimental investigations confirm this property for both algorithms. They also show that the introduced embedding distortions in terms of PSNR and PSNR-HVS are in almost linear dependence on the quantization parameter. It allows us to control the quality at an acceptable level when information embedding.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The JPEG 2000 image compression format, despite being less popular compared to JPEG, can
provide better compression and is therefore widely used in remote sensing systems, medical
imaging, and some other areas [1]. This fact underscores the importance of the task of protecting
JPEG 2000 images from unauthorized changes. For example, the recipient of remote sensing data must
have confidence in the absence of their falsification, as well as the doctor who makes the diagnosis
based on the digital image must be convinced of its authenticity and in the absence of distortions
caused by lossy data compression.</p>
      <p>
        One of the common approaches for the problem of protecting images from changes is embedding
of semi-fragile digital watermarks, which are preserved in images while minor changing and
destroyed after significant modifications. However, only a small number of semi-fragile
watermarking methods for JPEG 2000 can be found in the literature [2]-[4]. Specifically, such class
of methods includes one by Sun et al. [2] based on the EBCOT encoding procedure and the two
algorithms by Maeno et al. [3], which do not allow to control quality factor. One more algorithm by
Preda [4] is not linked with JPEG 2000 parameters. In this paper, we propose such a method for
lossy JPEG 2000 compression mode, based on the quantization index modulation technique (QIM)
[5].
2. JPEG 2000 lossy compression procedure
The flowchart of the compression algorithm is shown in Figure 1. At the first stage of compression,
the brightness of each component is reduced by 128 [6]. Then the image color space is converted from
RGB to YCbCr. The resulting image is subjected to discrete wavelet transform (DWT) with the
Daubechies filter bank (
        <xref ref-type="bibr" rid="ref7 ref9">9, 7</xref>
        ) for the partition of the image into low-frequency and high-frequency
areas (subbands), also called as the approximation and the details [6].
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
where   is the nominal dynamic range of subband  .
subband, using the following equations:
      </p>
      <p>According to [7, 8], two modes of calculating the values ∆ for various  are possible, which are
expounded quantization and derived quantization. In the first mode, the values (  ,   ) are explicitly
transmitted by the way similar to q-table in JPEG coding. In the second mode, which is considered in
this paper, (  ,   ) values are calculated from the given values ( 0,  0) ≜ ( ,  ), defined for the
LL 
=  −   +   ;  
=  ,
subband  [8].
where   is the total number of decomposition levels and   is the level number corresponding to</p>
      <p>
        The final step of the compression process is the error-free coding of quantized coefficients using
the arithmetic coding based on bit-planes. The JPEG 2000 decoder reverses the given operations.
3. Embedding information based on QIM
To embed the watermark, we modified the quantization operation (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) according to the QIM concept.
Specifically, we used two forms of QIM embedding rules: Simple-QIM [9]
 ( )
2∆
 ( ) = 2∆
      </p>
      <p>+ ∆ ∙  ( ),
 0( ),  1( )</p>
      <p>∆ ∆
− ;
2
2
− 1 ,  ∈ [0,  −
where  ( ) are quantized values, and</p>
      <p>( ) are the embedded bits, and DM-QIM (Dither Modulation
– Quantization Index</p>
      <p>Modulation) [5]. The latter one assumes the use of two dither vectors
 0( ),  1( ) that are consistent with each other and used when embedding bits “0” and “1”:
follows:
where  is the number of quantized values. Information embedding in DM-QIM is carried out as
∆ = 2  −  1 +
 
211 ,</p>
      <p>After the transformation, each coefficient   ( ,  ) of subband  is quantized by the formula:
determined by the following formula:
where ab(u, v) are quadrant coefficients and ∆b is the quantization step.</p>
      <p>The quantization step is represented by two bytes: 11-bit mantissa µb and 5-bit exponent εb and is
 ( ) = ∆ ⋅</p>
      <p>−   ( )( ).
 ( ) = sign( ( )) ∙ 2∆</p>
      <p>+ ∆ ∙  ( ) ,
| ( )|</p>
      <p>2∆</p>
      <p>
        To use (
        <xref ref-type="bibr" rid="ref4">4</xref>
        )-(
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) in our adaptations for JPEG 2000, the embedded watermark should be robust against
the JPEG 2000 quantization operation (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ). To achieve the robustness, we modified (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) to
and (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) – to
 ( ) = 
 ( ) ⋅ ∆ ⋅
 ( ) + 0.5 ⋅ ∆ ⋅ 
In the compression process, the values   ( ,  ) are used as  ( ), and ∆

are used as the
quantization steps ∆ (see (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )). The obtained quantized values  ( ) would be the values   ( ,  ).
      </p>
      <p>The dependence of the embedding rule on the quantization step ∆ makes it possible to provide
semi-fragility of the embedded information: it will be preserved under compression with quantization
steps smaller than ∆ and lost for steps greater than ∆.</p>
    </sec>
    <sec id="sec-2">
      <title>4. Experiments</title>
      <p>To verify the developed watermarking techniques, we embedded a watermark in the Lenna image.
the right. Visual distortions caused by embedding are not noticeable.</p>
      <p>Next, we should make sure that the watermark has the property of semi-fragility. Let 
be the
embedded information and   be the extracted information. Then the extraction accuracy will be
 = 8.5,  = 9.

1
 −1
 =0</p>
      <p>
        = 1 − 
= 1 −
( ( ),   ( )),
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
where 
is Bit Error Rate.
      </p>
      <p>
        Simple-QIM
shown in Figure 2) using JPEG 2000 standard with different quantization steps ∆
values according to the formulas (
        <xref ref-type="bibr" rid="ref2">2</xref>
        )-(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) (at the fixed  = 8.5). After compression, we attempted to
 determined by 
extract information and to estimate the accuracy using expression (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ). The results illustrated in Figure
3 show that the hidden data is preserved at a smaller quantization step (corresponding to a larger value
of  than that used in compression). Thus, both algorithms have shown their efficiency in terms of
providing semi-fragility to JPEG 2000 lossy compression. But if we compare two algorithms, we may
conclude that the Simple-QIM graph jump is sharper, i.e., it is closer to the ideal shape. Therefore, the
Simple-QIM modification is more accurate than DM-QIM at the acceptable quantization step border.
      </p>
      <p>Next, we investigated the distortions introduced by information hiding. For this purpose, we used
PSNR and PSNR-HVS metrics. The second one measures image quality from its perception by the
person [10]. Figures 4-5 show the results of this experiment for the image “Lenna” at various  (
fixed and equal to 8.5). The results confirm that the image does not undergo significant degradation,
 is
and also that image quality is directly related to  (the dependence is approximately linear). Thus, the
achieved semi-fragility by  can be expressed as semi-fragility by the specified level of PSNR or
100
80
60
R
N
S
P
40
20</p>
      <p>0
120
110
100
90
V80
S
H70
-R60
N50
PS40
30
20
10
0
8,00
9,00
10,00
11,00
13,00
14,00
15,00</p>
      <p>16,00
12,00</p>
      <p>determines the quantization step when embedding a watermark ( = 8.5).
8,00
9,00
10,00
11,00
13,00
14,00
15,00</p>
      <p>16,00
12,00

determines the quantization step when embedding a watermark ( = 8.5).</p>
    </sec>
    <sec id="sec-3">
      <title>5. Conclusion</title>
      <p>In this paper, we proposed two watermarking algorithms for semi-fragile data hiding in JPEG 2000
based on QIM
concept: Simple-QIM</p>
      <p>and DM-QIM. Our investigations have shown that both
algorithms provide semi-fragililty
property to JPEG
2000: a
watermark is preserved under
compression
with quality parameters greater than the specified one and is deleted
when the
compression quality is reduced. Visually, the distortions caused by embedding the CEH are not
noticeable. Moreover, the measurements of these distortions using PSNR and PSNR-HVS show that
allows us to control the quality at an acceptable level when information embedding.
the values are in almost linear dependence on the parameter  . It is a very important property which</p>
      <sec id="sec-3-1">
        <title>Simple-QIM DM-QIM</title>
      </sec>
      <sec id="sec-3-2">
        <title>SimpleQIM</title>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgments</title>
      <p>This work was supported by the Russian Science Foundation under grant 18-71-00052.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Gonzalez R C and Woods R E 2009 Digital Image</surname>
          </string-name>
          <article-title>Processing (Pearson Education)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Sun</surname>
            <given-names>Q</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chang</surname>
            <given-names>S-F</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kurato</surname>
            <given-names>M</given-names>
          </string-name>
          and
          <string-name>
            <surname>Suto M 2002</surname>
          </string-name>
          <article-title>A quantitative semi-fragile JPEG2000 image authentication system</article-title>
          <source>Proceedings International Conference on Image Processing</source>
          <volume>2</volume>
          <fpage>II</fpage>
          -II
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Maeno</surname>
            <given-names>K</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sun</surname>
            <given-names>Q</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chang S-F and Suto M 2006</surname>
          </string-name>
          <article-title>New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization</article-title>
          <source>IEEE Transactions on Multimedia</source>
          <volume>8</volume>
          <fpage>32</fpage>
          -
          <lpage>45</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Preda</surname>
            <given-names>R O</given-names>
          </string-name>
          <year>2013</year>
          Semi
          <article-title>-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain</article-title>
          <source>Measurement</source>
          <volume>46</volume>
          <fpage>367</fpage>
          -
          <lpage>373</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Chen</surname>
            <given-names>B</given-names>
          </string-name>
          and
          <string-name>
            <surname>Wornell G 2001 Quantization Index</surname>
          </string-name>
          <article-title>Modulation: A Class of Provably Good Methods for Digital Watermarking</article-title>
          and
          <source>Information Embedding IEEE Transaction on Information Theory</source>
          <volume>47</volume>
          <fpage>1423</fpage>
          -
          <lpage>1443</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Schelkens</surname>
            <given-names>P</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Skodras</surname>
            <given-names>A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Ebrahimi</surname>
            <given-names>T 2009</given-names>
          </string-name>
          <article-title>The JPEG 2000 suite</article-title>
          (John Wiley &amp; Sons)
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Rabbani</surname>
            <given-names>M</given-names>
          </string-name>
          and
          <string-name>
            <surname>Joshi</surname>
            <given-names>R 2002</given-names>
          </string-name>
          <article-title>An overview of the JPEG 2000 still image compression standard</article-title>
          <source>Signal Processing: Image Communication</source>
          <volume>17</volume>
          <fpage>3</fpage>
          -
          <lpage>48</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Marcellin</surname>
            <given-names>M W</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lepley</surname>
            <given-names>M A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bilgin</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flohr</surname>
            <given-names>T J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chinen</surname>
            <given-names>T T</given-names>
          </string-name>
          and
          <string-name>
            <surname>Kasner J H 2002</surname>
          </string-name>
          <article-title>An overview of quantization in JPEG 2000 Signal Processing</article-title>
          :
          <source>Image Communication</source>
          <volume>17</volume>
          <fpage>73</fpage>
          -
          <lpage>84</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Mitekin</surname>
            <given-names>V A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Fedoseev</surname>
            <given-names>V A</given-names>
          </string-name>
          <year>2018</year>
          <article-title>New secure QIM-based information hiding algorithms</article-title>
          <source>Computer Optics</source>
          <volume>42</volume>
          (
          <issue>1</issue>
          )
          <fpage>118</fpage>
          -
          <lpage>127</lpage>
          DOI: 10.18287/
          <fpage>2412</fpage>
          -6179-2018-42-1-
          <fpage>118</fpage>
          -127
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Egiazarian</surname>
            <given-names>K</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Astola</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ponomarenko</surname>
            <given-names>N</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukin</surname>
            <given-names>V</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Battisti</surname>
            <given-names>F</given-names>
          </string-name>
          and
          <string-name>
            <surname>Carli M 2006</surname>
          </string-name>
          <article-title>New fullreference quality metrics based on</article-title>
          <source>HVS Proceedings of the Second International Workshop on Video Processing and Quality Metrics 4</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>