<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Semi-fragile watermarking for HGI image compression</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alina Bavrina</string-name>
          <email>bavrina@mail.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Victor Fedoseev</string-name>
          <email>vicanfed@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Samara National Research University;, Image Processing Systems Institute of RAS - Branch of the FSRC, "Crystallography and Photonics" RAS</institution>
          ,
          <addr-line>Samara</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <fpage>157</fpage>
      <lpage>163</lpage>
      <abstract>
        <p>-A novel semi-fragile watermarking system adopted for the HGI image compression algorithm is proposed. The watermarking method exploits the hierarchical structure of the image when embedding and replaces post-interpolation residual quantization inside HGI compression with a special quantizer based on quantization index modulation. As a result, the protected image became robust to HGI compression with a tunable quality parameter. Several experiments have shown the ability of the proposed watermarking system to protect images with high quality in terms of PSNR. We also investigate the accuracy of local distortion detection. As a result, a tradeoff between image quality and forgery detection accuracy has been found.</p>
      </abstract>
      <kwd-group>
        <kwd>digital image processing</kwd>
        <kwd>digital watermarks</kwd>
        <kwd>image compression</kwd>
        <kwd>hierarchical grid interpolation method</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>Nowadays, the problem of image (and more specifically,
remote sensing image) protection against malicious
distortions plays an important role.</p>
      <p>Satellite and drone images are increasingly used in
various fields of industry, agriculture, in the prevention of
natural disasters, in the military sphere, and in the media [1].
Modern image processing tools, which include not only
raster editors but also artificial intelligence tools such as
generative adversarial neural networks, allow users to create
fake images or their fragments that are practically
indistinguishable from real ones [2, 3]. Distribution of such
fake images can have serious economic and political
consequences [4, 5].</p>
      <p>
        One way to protect an image from tampering is to embed
a fragile or semi-fragile digital watermark [
        <xref ref-type="bibr" rid="ref7">6, 7</xref>
        ]. Fragile
watermarks are destroyed after any modifications of
protected data. Therefore, if there is a set of allowable
modifications (such as compression, or cropping, or color
correction, etc.), it is better to use semi-fragile watermarks.
They are resistant to the allowable transformations and are
destroyed by any others [8]. The difference between the
embedded watermarks and those extracted at the
authentication stage could evidence illegal changes in the
protected image.
      </p>
      <p>Remote sensing images usually have high spatial and/or
spectral resolution. Therefore they are usually stored and
transmitted in a compressed form. Consequently, the
“allowable” transformations often include distortions arising
from compression. A watermarking system (we use this term
to determine a set of algorithms for watermark embedding
and extraction [8]) designed for compressed image protection
must be resistant to distortions caused by a corresponding
compression algorithm. That is, the embedded watermark
should be extracted with high accuracy from compressed
data.</p>
      <p>
        In this paper, we consider a hierarchical grid interpolation
(HGI) compression method, which shows high performance
for still images and especially for remote sensing data [
        <xref ref-type="bibr" rid="ref11 ref6">9,
10</xref>
        ]. This method has two main advantages: the ability to
control the compression error and the ability of hierarchical
access to data. These properties make the method attractive
for applications in areas where the accuracy of image
restoration after compression is important, for example, in
remote sensing or when processing medical images.
      </p>
      <p>
        There are some examples of semi-fragile watermarking
systems adopted for different compression formats. More
than two dozens were developed for JPEG ([
        <xref ref-type="bibr" rid="ref12 ref13">11, 12</xref>
        ], many
algorithms are compared in the review paper [7]). We can
also mention papers [
        <xref ref-type="bibr" rid="ref14 ref15 ref16">13, 14, 15</xref>
        ]. Paper [
        <xref ref-type="bibr" rid="ref16">15</xref>
        ] contains an
overview of existing watermarking systems for the H.264
video. However, we did not find any example of a
watermarking system adopted for HGI. This fact could be
explained by a limited HGI usage by the academic
community. However, both its importance in practice for
remote sensing data storage and its closeness to some other
hierarchical compression methods based on wavelets or
quadtrees (such as [
        <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21 ref22">17-21</xref>
        ]) make it actual the study of HGI
watermarking.
      </p>
      <p>
        The paper proposes a semi-fragile watermarking system
based on the QIM (Quantization Index Modulation)
technique [
        <xref ref-type="bibr" rid="ref23 ref24">22, 23</xref>
        ], consistent with the HGI compression
algorithm. The idea is to use the hierarchical structure of the
image when embedding and to replace an HGI quantizer
with a QIM-based quantizer.
      </p>
      <p>The parameters of the proposed system make it possible
to find the compromise between the watermarking
distortions and the robustness to certain attacks (the paper
considers two attacks of image compression and local
alteration).</p>
      <p>The rest of the paper is organized as follows. Section 2
describes the HGI compression method, necessary for a
better understanding of the proposed watermarking system,
which is described in Section 3. The next section contains
some numerical experiments to study the characteristics of
the proposed system. Finally, conclusion and future work
follow in Section 5.</p>
    </sec>
    <sec id="sec-2">
      <title>II. THE HGI COMPRESSION METHOD The HGI compression method is based on the representation of an image I ( m , n ) as a union of hierarchical levels:</title>
      <p>L 1
I ( m , n ) </p>
      <p>I l ( m , n ) ,
l  0
where I L 1 ( m , n ) are the highest level samples taken in a
distance of 2 L 1 at both coordinates. The following equation
specifies the lower levels:</p>
      <p>I l  { I l ( m , n )} \ { I l 1 ( m , n )} .</p>
      <p>During compression, at first, samples of the current level
are interpolated by higher-level samples. The following
stages of the compression procedure are quantization of the
interpolation errors, reconstruction of samples (for use at
lower levels), statistical coding of post-interpolation
residuals, and their storage in an archive. Samples of the
highest level are stored in the archive unchanged.</p>
      <p>Let us consider these stages in more detail. Let l be a
current level.</p>
      <sec id="sec-2-1">
        <title>A. Interpolation</title>
        <p>Interpolation of samples at level l is based on samples of
higher levels that have already passed the quantization and
reconstruction procedure:</p>
        <p>L 1
Iˆl ( m , n )  PH G I (</p>
        <p>{ I k ( m , n )}) ,
k  l 1
where PHGI (...) is an interpolation function.</p>
      </sec>
      <sec id="sec-2-2">
        <title>B. Calculation of post-interpolation residuals</title>
        <p>Calculation of the differences between true sample values
and those obtained by the interpolation:</p>
        <p>R ( m , n )  I l ( m , n )  Iˆl ( m , n ) .</p>
      </sec>
      <sec id="sec-2-3">
        <title>C. Quantization of post-interpolation residuals:</title>
        <p>R  HGI ( m , n )  Q H G I ( R ,  H G I ) ,
where Q H G I is a quantizer that guarantees the preservation of
the recovery error  HGI (either maximal or root mean
square).</p>
      </sec>
      <sec id="sec-2-4">
        <title>D. Calculation of reconstructed sample values</title>
        <p>Based on the quantized post-interpolation residuals, the
calculation of differential values is done, followed by the
calculation of reconstructed sample values:</p>
        <p>RHGI ( m , n )  Q H1GI ( R HGI ,  HGI ) ,</p>
        <p>I l ( m , n )  Iˆl ( m , n )  R  HGI ( m , n ) .</p>
      </sec>
      <sec id="sec-2-5">
        <title>E. Statistical encoding</title>
        <p>The quantized post-interpolation residuals undergo a
statistical encoding procedure.</p>
        <p>III. SEMI-FRAGILE WATERMARKING FOR HGI COMPRESSION</p>
        <p>The proposed watermarking system uses a hierarchical
image representation and the HGI compression scheme with
a changed quantizer.</p>
        <p>Let I ( m , n )  [0 , 2 5 5 ] be the source image, or cover
image, B ( k )  {0 ,1} be a binary sequence acting as a
watermark. The correspondence between source image
samples and the watermark is set by a certain mapping. As a
result of this mapping, we obtain the following matrix:
  1, B ( k )  0

W ( m , n )  F ( B )   0 , n o e m b e d d in g in to ( m , n ) 
1, B ( k )  1</p>
        <p>The mapping takes into account the hierarchical structure
of the image used in HGI, and also uses a pseudo-random
secret key, known both at the embedding and extraction side.</p>
      </sec>
      <sec id="sec-2-6">
        <title>A. Interpolation</title>
        <p>L 1
Iˆl ( m , n )  PQ IM (</p>
        <p>{ I kW ( m , n )}) ,
k  l 1
where PQ IM (...) is the interpolation function.</p>
      </sec>
      <sec id="sec-2-7">
        <title>B. Calculation of post-interpolation residuals</title>
        <p>R ( m , n )  I l ( m , n )  Iˆl ( m , n ) .</p>
      </sec>
      <sec id="sec-2-8">
        <title>C. Quantization-based watermarking</title>
        <p>R QIM ( m , n )  Q Q IM ( R ,W ,  Q IM ) ,
where Q Q IM is a quantizer based on QIM watermarking
[2223], and  Q IM is half of the QIM quantization step. This
parameter determines the robustness of the watermark to
additive white noise and the amount of distortion introduced
by embedding.</p>
      </sec>
      <sec id="sec-2-9">
        <title>D. Calculation of reconstructed sample values</title>
        <p>RQIM ( m , n )  Q QI1M ( RQIM ,  QIM ) ,</p>
        <p>I lW ( m , n )  Iˆl ( m , n )  R qim ( m , n ) .</p>
        <p>When extracting the watermark from a received and
possibly changed image I W ( m , n ) , the same steps are
performed, but watermark values W ( m , n ) are restored at the
quantization stage.</p>
        <p>IV. EXPERIMENTAL INVESTIGATION OF THE PROPOSED</p>
        <p>WATERMARKING SYSTEM</p>
        <p>When conducting the research, we held the following
scheme. Suppose I be the source image, W be the watermark.
Embedding W into I with parameter  Q IM is done according
to Section 3. Distortions introduced by watermark
embedding are estimated using the PSNR criterion, which
indicates Peak Signal to Noise Ratio between the source
image I and the watermarked image I W .</p>
        <p>I W can be subjected to any attacks, so on the receiver
side, we have an image I W that may differ from I W . The
watermark W is extracted from I W and compared with
initial watermark W. The paper considers two types of
attacks: compression and local editing.</p>
        <p>
          To carry out numerical experiments, ten images from the
Waterloo Grayscale Set 1 and 2 [
          <xref ref-type="bibr" rid="ref25">24</xref>
          ] were chosen. Fragments
of M  N  2 5 7 size were extracted from each image. The
matrix W was formed as follows: zero values for the samples
of level l  L  1 and the equally probable values 1 and -1
for other samples.
        </p>
      </sec>
      <sec id="sec-2-10">
        <title>A. Specification of HGI and QIM parameters</title>
        <p>The following parameter values were used.
</p>
        <p>Bilinear interpolation functions as PHGI (...) and</p>
        <p>HGI quantizer to ensure maximum recovery error
 mH GaxI :
Q H G I ( R ,  H G I )   H G I  R o u n d (
) ,  H G I  2  mH GaxI ,</p>
        <p>
          Q H1G I ( R  HGI ,  H G I )  R  HGI .
As a QIM quantizer, the simplest QIM
quantization function is used [
          <xref ref-type="bibr" rid="ref24">23</xref>
          ]:
        </p>
        <p>R
 H G I
 R
 2  Q IM  R o u n d (
 2  Q IM
Q Q IM ( R , W ,  Q IM )   2  Q IM  R o u n d ( R ) 
 2  Q IM

   Q IM  s ig n ( R  R o u n d (

</p>
        <p>Q QI1M ( R QIM ,  Q IM )  R QIM ,</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Watermark extraction:</title>
      <p>) , W  {0 ,  1}</p>
      <p>R
2  Q IM</p>
      <p>) ) , W  1</p>
      <p>R
W ( m , n )  2  m o d ( R o u n d ( QIM ), 2 )  1
 Q IM
HGI parameters setting the embedding rate: lm in , lm ax
and θ. Parameters lm in and lm ax are the minimal and
maximal hierarchical levels correspondingly, in
which the embedding is performed. Parameter θ sets
the percentage of current hierarchical level samples
that undergo the watermark embedding.</p>
      <sec id="sec-3-1">
        <title>B. Distortions introduced by watermarking</title>
        <p>This subsection is aimed to investigate image distortions
introduced by watermark embedding. Fig. 1 represents the
dependence of P S N R ( I , I W ) on the value  Q IM (the values
were averaged for ten investigated images). The value L  7
of the maximum number of hierarchical levels was used. The
figure shows that the PSNR value decreases with increasing
 Q IM .</p>
        <p>


</p>
        <p>One more parameter that affects the degree of the
distortion is the percentage of embedding into each
hierarchical level θ. Fig. 2 represents the dependence of
PSNR on θ value for the fixed  Q IM  2 0 . Again, the more
samples are used for embedding, the lower PSNR value is.</p>
        <p>So, we can make the conclusion that the degree of cover
image distortions, resulting from watermark embedding, can
be regulated by changing  Q IM , lm in , lm ax , and θ.</p>
        <p>Fig. 3 allows us to estimate visually the distortions
introduced by watermark embedding. Fig. 4 shows
histograms of the original and the watermarked images. One
can see there are no elements in the watermarked image
histogram that are may indicate the watermark existence to a
third party (like regular "teeth" or "dips").
interested in how the ratio of HGI and QIM parameters
affects the restoration of the watermark, as well as what
distortions the embedding and compression introduce into
the cover image.</p>
        <p>For W and W comparison, the BER (Bit Error Rate)
criterion was used. Fig. 5 shows the dependence of
B E R (W , W ) and maximal deviation  m ax on  H G I under the
fixed value  Q IM (averaged щмук ten investigated images).
levels ( lm in  0 , lm ax  7 ) and the maximum for embedding
only in the highest hierarchical level ( lm in  lm ax  7 ).
Fig. 1. Dependence of PSNR(I,IW) on ɛQIM value.</p>
        <p>The next part of the investigation is concerned with the
question of how the embedding applied to a subset of
hierarchical levels effects on distortions of the source image.
Table 1 gives the PSNR values for different combinations of
lm in and lm ax parameters values (averaged for investigated
images). The table shows that the more samples undergo the
watermarking, the lower PSNR value is. PSNR value has
achieved the minimum for embedding in all hierarchical</p>
        <p>Investigations show that BER is zero
for values
 H G I   Q IM
2
, as
well as for  H G I   Q IM
.</p>
        <p>When
 H G I   Q IM BER undergoes a sharp jump and is set at a
value of about 0.5 (which indicates the destruction of the
watermark).</p>
        <p>When  H G I   Q IM , the watermark is extracted without
errors, since after the embedding, all interpolation residuals
are multiple  Q IM , and their re-quantization in HGI on the
same value makes no changes.
(a)</p>
      </sec>
      <sec id="sec-3-2">
        <title>D. Reconstruction of local distortions area</title>
        <p>In this subsection we analyze the accuracy of local
distortion area estimation. To model local distortions, for
simplicity, we replaced samples within a predefined mask by
random samples, as shown in Fig. 6. Such processing makes
it easy to estimate the mask of distortions without using a
watermark, but we have not used any information on the type
of distortions in the investigation. We will denote the
resulting image as I W .</p>
        <p>On the receiving side W is extracted from I W and is
compared with W that is generated using the same secret key
as on the embedding side (with the same values lm in , lm ax ,
and θ). The difference between W and W is not equal to D
(because watermark bits are correctly extracted from
approximately half of the distorted samples randomly) (see
Fig. 6).</p>
        <p>Semi-fragile watermarking is always a compromise
between the watermark robustness and imperceptibility. In
the case of watermark embedding in selective hierarchical
levels and with   1 0 0 % we have got a sparse structure of
nonzero difference between W and W . The following
algorithm is suggested for local distortions area
reconstruction D .</p>
        <p>In the first step, going down from the samples of the
highest hierarchical level to lm in , when W ( m , n )  W ( m , n )
and</p>
        <p>W ( m , n )  0
we
fill
with
"1" its
neighborhood
D ( m  ( 2 l  1), n  ( 2 l  1))  1 , where l is a current level. This
area can "suffer" from the distortion of sample (m,n) at the
sequential reconstruction of samples.</p>
        <p>To investigate the quality of the proposed algorithm, we
use the following criteria: q01, the relative quantity of false
positive detections of local distortion area, q10, the relative
quantity of omissions, their sum q:
where ǀ ǀ is cardinality of a set. We define denominator as the
size of local distortions area to make criteria values
comparable for big and small areas.</p>
        <p>The next part of the current subsection is aimed to
investigate how criteria values change for different values of
lm in , lm ax , and θ. In this part, we use only the "Lena" image,
and all presented numerical values have been averaged over
100 observations.</p>
        <p>Fig. 7 presents the dependence of P S N R ( I , I W ) on θ for
different combinations of lm in , lm ax
and fixed
value
 Q IM  2 0 . The figure shows that for lm in  lm ax  0 , the
curve lies too low (cover image distortions are too evident).
Watermark embedding in the second hierarchical level
provides better PSNR, but q is too high. So, the cases
lm in  lm ax  1 and lm in  1 , lm ax  2 should be analyzed.</p>
        <p>and lm in  1 , lm ax  2 for a fixed value
 Q IM  2 0 . The comparison can be done as follows. Suppose
we are interested in the value of the relative quantity of
omissions q10  0 .0 5 , we can find the intersection with q10
curve and get θ and q values (see green dashed line and
values). So, we get that for lm in  lm ax  1 the criterion value
q=0.2, and for lm in  1 , lm ax  2 the criterion value q=0.3.
Therefore, values lm in  lm ax  1 and θ=70..100% can be
recommended for the embedding in the case of local
distortion attack.</p>
        <p>Fig. 9-10 represent some results of the proposed
algorithm of local distortions area reconstruction for
parameter values, highlighted in Fig. 8 (see green circle).
The comparison shows better results for Fig. 9 than for Fig.
10.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>V. CONCLUSIONS</title>
      <p>In this paper, we have proposed a semi-fragile
watermarking system adopted for the HGI compression
algorithm. Its main idea is to utilize the HGI scheme in the
watermarking procedure and to replace the quantization of
interpolation residuals with watermark embedding using a
QIM-based method. This approach makes it possible to
obtain the robustness against HGI compression in a
predefined range of quality factors.</p>
      <p>The parameters of the proposed algorithm allow us to
find the compromise between distortions, contributed by the
embedding, and robustness to certain attacks.</p>
      <p>The conducted experiments have shown the ability of the
proposed watermarking system to protect images with high
quality in terms of PSNR. We also investigated the accuracy
of local distortion detection. As a result, a trade-off between
image quality and forgery detection accuracy has been found.</p>
      <p>
        Future work may include the investigation of some other
QIM family quantizers, including those providing fewer
distortions (like DC-QIM, distortion compensated QIM [
        <xref ref-type="bibr" rid="ref23">22</xref>
        ])
and more protected ones (like IM-QIM, statistically immune
QIM [
        <xref ref-type="bibr" rid="ref24">23</xref>
        ]).
      </p>
    </sec>
    <sec id="sec-5">
      <title>ACKNOWLEDGMENT</title>
      <p>The work was funded by the RSF grant #18-71-00052 (in
parts of watermarking system construction and
investigation), and by the RFBR grant #19-29-09045(in part
of application and parameters adaptation to protect remote
sensing data and local distortion estimation).
(a) lm in  lm ax  1 , green circle corresponds to q=0.2, q10=0.05, q01=0.15,
θ=68%, PSNR=31.65
(b) lm in  1 , lm ax  2 , green circle corresponds to q=0.3, q10=0.05,
q01=0.25, θ=47%, PSNR=31.85</p>
      <p>URL:</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>E.</given-names>
            <surname>Chuvieco</surname>
          </string-name>
          , “
          <article-title>Fundamentals of Satellite Remote Sensing: An Environmental Approach</article-title>
          ,” Boca Raton: CRC Press,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>X.</given-names>
            <surname>Xuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Peng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wang</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Dong</surname>
          </string-name>
          , “
          <article-title>On the Generalization of GAN Image Forensics,” Biometric Recognition</article-title>
          , Cham, pp.
          <fpage>134</fpage>
          -
          <lpage>141</lpage>
          ,
          <year>2019</year>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -31456-9_
          <fpage>15</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Westerlund</surname>
          </string-name>
          , “
          <article-title>The emergence of deepfake technology: A review,” Technology Innovation Management Review</article-title>
          , vol.
          <volume>9</volume>
          , no.
          <issue>11</issue>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>52</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Piva</surname>
          </string-name>
          , “
          <article-title>An Overview on Image Forensics,” ISRN Signal Processing</article-title>
          , vol.
          <year>2013</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          ,
          <year>2013</year>
          . DOI:
          <volume>10</volume>
          .1155/
          <year>2013</year>
          /496701.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Rocha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Scheirer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Boult</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Goldenstein</surname>
          </string-name>
          , “
          <article-title>Vision of the Unseen: Current Trends and Challenges in Digital Image and Video Forensics,” ACM Comput</article-title>
          . Surv., vol.
          <volume>43</volume>
          , no.
          <issue>4</issue>
          , pp.
          <volume>26</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>26</lpage>
          :
          <fpage>42</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>DOI: 10.1145/1978802</source>
          .1978805.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>I.J.</given-names>
            <surname>Cox</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.L.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.A.</given-names>
            <surname>Bloom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fridrich</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Kalker</surname>
          </string-name>
          , “Digital Watermarking and Steganography,” USA: Elsevier,
          <year>2008</year>
          , 587 p.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Egorova</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.A.</given-names>
            <surname>Fedoseev</surname>
          </string-name>
          , “
          <article-title>A classification of semi-fragile watermarking systems for JPEG images</article-title>
          ,”
          <source>Computer Optics</source>
          , vol.
          <volume>43</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>419</fpage>
          -
          <lpage>433</lpage>
          ,
          <year>2019</year>
          . DOI:
          <volume>10</volume>
          .18287/
          <fpage>2412</fpage>
          -6179-2019-43-3-
          <fpage>419</fpage>
          - 433.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Barni</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Bartolini</surname>
          </string-name>
          , “Watermarking Systems Engineering,” New-York, USA: Marcel Dekker, Inc.,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>M.V.</given-names>
            <surname>Gashnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.I.</given-names>
            <surname>Glumov</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Sergeev</surname>
          </string-name>
          , “
          <article-title>A hierarchical compression method for space images</article-title>
          ,
          <source>” Automation and Remote Control</source>
          , vol.
          <volume>71</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>501</fpage>
          -
          <lpage>513</lpage>
          ,
          <year>2010</year>
          . DOI:
          <volume>10</volume>
          .1134/ S0005117910030112.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.V.</given-names>
            <surname>Gashnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.I.</given-names>
            <surname>Glumov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.A.</given-names>
            <surname>Mitekin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Myasnikov</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Sergeev</surname>
          </string-name>
          , “
          <article-title>Hyperspectral remote sensing data compression and protection</article-title>
          ,”
          <source>Computer Optics</source>
          , vol.
          <volume>40</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>689</fpage>
          -
          <lpage>712</lpage>
          ,
          <year>2016</year>
          . DOI:
          <volume>10</volume>
          .18287/
          <fpage>2412</fpage>
          -6179-2016-40-5-
          <fpage>689</fpage>
          -712.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>C.Y.</given-names>
            <surname>Lin</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.F.</given-names>
            <surname>Chang</surname>
          </string-name>
          , “
          <article-title>Semifragile watermarking for authenticating JPEG visual content</article-title>
          ,” Electronic Imaging, pp.
          <fpage>140</fpage>
          -
          <lpage>151</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ho</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhao</surname>
          </string-name>
          , “
          <article-title>Novel fast self-restoration semifragile watermarking algorithm for image content authentication resistant to JPEG compression</article-title>
          ,
          <source>” Journal of Electronic Imaging</source>
          , vol.
          <volume>17</volume>
          , no 3, pp.
          <fpage>72</fpage>
          -
          <lpage>85</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Maeno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.-F.</given-names>
            <surname>Chang</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Suto</surname>
          </string-name>
          , “
          <article-title>New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization</article-title>
          ,
          <source>” IEEE Transactions on Multimedia</source>
          , vol.
          <volume>8</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>32</fpage>
          -
          <lpage>45</lpage>
          ,
          <year>2006</year>
          . DOI:
          <volume>10</volume>
          .1109/TMM.
          <year>2005</year>
          .
          <volume>861293</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.-F.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kurato</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Suto</surname>
          </string-name>
          , “
          <article-title>A quantitative semifragile JPEG2000 image authentication system</article-title>
          ,
          <source>” Proceedings. International Conference on Image Processing</source>
          , vol.
          <volume>2</volume>
          , p.
          <fpage>II</fpage>
          -II,
          <year>2002</year>
          . DOI:
          <volume>10</volume>
          .1109/ICIP.
          <year>2002</year>
          .
          <volume>1040102</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.</given-names>
            <surname>Fedoseev</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Androsova</surname>
          </string-name>
          , “
          <article-title>Watermarking algorithms for JPEG 2000 lossy compressed images</article-title>
          ,
          <source>” CEUR Workshop Proceedings</source>
          , vol.
          <volume>2391</volume>
          , pp.
          <fpage>366</fpage>
          -
          <lpage>370</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tew</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Wong</surname>
          </string-name>
          , “
          <article-title>An overview of information hiding in H.264/AVC compressed video</article-title>
          ,
          <source>” IEEE Transactions on Circuits and Systems for Video Technology</source>
          , vol.
          <volume>24</volume>
          , no.
          <issue>2</issue>
          . pp.
          <fpage>305</fpage>
          -
          <lpage>319</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>R</given-names>
            <surname>K. Senapati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.C.</given-names>
            <surname>Pati and K.K. Mahapatra</surname>
          </string-name>
          , “
          <article-title>Low bit rate image compression using hierarchical listless block-tree dtt algorithm,”</article-title>
          <string-name>
            <given-names>Int. J. Image</given-names>
            <surname>Grap</surname>
          </string-name>
          ., vol.
          <volume>13</volume>
          , no.
          <issue>01</issue>
          , p.
          <fpage>1350005</fpage>
          ,
          <year>2013</year>
          . DOI:
          <volume>10</volume>
          .1142/S0219467813500058.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Morvan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Farin and P.H.N. de With</surname>
          </string-name>
          , “
          <article-title>Depth-Image Compression Based on an R-D Optimized Quadtree Decomposition for the Transmission of Multiview Images,”</article-title>
          <source>IEEE International Conference on Image Processing</source>
          , vol.
          <volume>5</volume>
          , p. V-105
          <string-name>
            <surname>-</surname>
          </string-name>
          V-
          <volume>108</volume>
          ,
          <year>2007</year>
          . DOI:
          <volume>10</volume>
          .1109/ ICIP.
          <year>2007</year>
          .
          <volume>4379776</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rabbani</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Joshi</surname>
          </string-name>
          , “
          <article-title>An overview of the JPEG 2000 still image compression standard,”</article-title>
          <source>Signal Processing: Image Communication</source>
          , vol.
          <volume>17</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>48</lpage>
          ,
          <year>2002</year>
          . DOI:
          <volume>10</volume>
          .1016/S0923-
          <volume>5965</volume>
          (
          <issue>01</issue>
          )
          <fpage>00024</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Munteanu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cornelis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. Van Der</given-names>
            <surname>Auwera</surname>
          </string-name>
          and P. Cristea, “
          <article-title>Wavelet image compression - the quadtree coding approach</article-title>
          ,
          <source>” IEEE Transactions on Information Technology in Biomedicine</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>176</fpage>
          -
          <lpage>185</lpage>
          ,
          <year>1999</year>
          . DOI:
          <volume>10</volume>
          .1109/4233.788579.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>J.</given-names>
            <surname>Andrew</surname>
          </string-name>
          , “
          <article-title>A simple and efficient hierarchical image coder</article-title>
          ,
          <source>” Proceedings of International Conference on Image Processing</source>
          , vol.
          <volume>3</volume>
          , pp.
          <fpage>658</fpage>
          -
          <lpage>661</lpage>
          ,
          <year>1997</year>
          . DOI:
          <volume>10</volume>
          .1109/ICIP.
          <year>1997</year>
          .
          <volume>632207</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>B.</given-names>
            <surname>Chen</surname>
          </string-name>
          and G. Wornell, “
          <article-title>Quantization index modulation: a class of provably good methods for digital watermarking</article-title>
          and information embedding,
          <source>” IEEE Transaction on Information Theory</source>
          , vol.
          <volume>47</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>1423</fpage>
          -
          <lpage>1443</lpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>V.A.</given-names>
            <surname>Mitekin</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.A.</given-names>
            <surname>Fedoseev</surname>
          </string-name>
          , “
          <article-title>New secure qim-based information hiding algorithms</article-title>
          ,” Computer Optics, vol.
          <volume>42</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>118</fpage>
          -
          <lpage>127</lpage>
          ,
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .18287/
          <fpage>2412</fpage>
          -6179-2018-42-1-
          <fpage>118</fpage>
          -127.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [24]
          <article-title>The Waterloo Image Repository [Online]</article-title>
          . http://links.uwaterloo.ca/Repository.html, (
          <volume>10</volume>
          .
          <fpage>05</fpage>
          .
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>