We propose the use of robust watermarks to enable the characterisation of attacks even after lossy compression, such as JPEG and JPEG2000. A previously constructed Bayesian framework is used to allow characterisation of attacks from a predetermined library, and the double watermarking technique as earlier proposed by the authors is employed to generate the features used to drive the classifier. The results show that the developed techniques perform well for both types of compression.
|Translated title of the contribution||Attack characterisation of compressed images|
|Title of host publication||IEEE International Conference on Consumer Electronics (ICCE 2003) Los Angeles, CA, USA|
|Publisher||Institute of Electrical and Electronics Engineers (IEEE)|
|Pages||66 - 67|
|Number of pages||2|
|Publication status||Published - Jun 2003|
|Event||International Conference on Consumer Electronics, 2003 - Los Angeles, United States|
Duration: 1 Jun 2003 → …
|Conference||International Conference on Consumer Electronics, 2003|
|Period||1/06/03 → …|
Bibliographical noteRose publication type: Conference contribution
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Bristol's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to email@example.com.
By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
- data compression