Attack characterisation of compressed images

HD Knowles, DA Winne, CN Canagarajah, DR Bull

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)
318 Downloads (Pure)


We propose the use of robust watermarks to enable the characterisation of attacks even after lossy compression, such as JPEG and JPEG2000. A previously constructed Bayesian framework is used to allow characterisation of attacks from a predetermined library, and the double watermarking technique as earlier proposed by the authors is employed to generate the features used to drive the classifier. The results show that the developed techniques perform well for both types of compression.
Translated title of the contributionAttack characterisation of compressed images
Original languageEnglish
Title of host publicationIEEE International Conference on Consumer Electronics (ICCE 2003) Los Angeles, CA, USA
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages66 - 67
Number of pages2
ISBN (Print)0780377214
Publication statusPublished - Jun 2003
EventInternational Conference on Consumer Electronics, 2003 - Los Angeles, United States
Duration: 1 Jun 2003 → …


ConferenceInternational Conference on Consumer Electronics, 2003
Country/TerritoryUnited States
CityLos Angeles
Period1/06/03 → …

Bibliographical note

Rose publication type: Conference contribution

Terms of use: Copyright © 2003 IEEE. Reprinted from IEEE International Conference on Consumer Electronics, 2003 (ICCE 2003).

This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Bristol's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to

By choosing to view this document, you agree to all provisions of the copyright laws protecting it.


  • data compression


Dive into the research topics of 'Attack characterisation of compressed images'. Together they form a unique fingerprint.

Cite this