This document summarizes a research paper that proposes a practical self-recovery mechanism for JPEG compressed digital images. The mechanism extends a digital fountain code model to account for errors in watermark extraction and block classification. It guarantees high and stable reconstruction quality without introducing artifacts from errors. The mechanism also allows for efficient handling of high-resolution and color images. It introduces a hybrid approach to spreading reference information across the entire image, balancing tampering rates and computational complexity. This reduces watermark embedding times from minutes to seconds, even on mobile devices.
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Towards practical self embedding for jpeg-compressed digital images
1. 2020 – 2021
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 Mo: +91 9500218218 / +91 8220150373
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
Towards Practical Self-Embedding for JPEG-Compressed Digital Images
Abstract:
This paper deals with the design of a practical self-recovery mechanism for lossy
compressed JPEG images. We extend a recently proposed model of the content
reconstruction problem based on digital fountain codes to take into account the impact
of emerging watermark extraction and block classification errors. In contrast to existing
methods, our scheme guarantees a high and stable level of reconstruction quality.
Instead of introducing reconstruction artifacts, emerging watermark extraction errors
penalize the achievable tampering rates. We introduce new mechanisms that allow for
handling high-resolution and color images efficiently. In order to analyze the behavior of
our scheme, we derive an improved model to calculate the reconstruction success
probability. We introduce a new hybrid mechanism for spreading the reference
information over the entire image, which allows to find a good balance between the
achievable tampering rates and the computational complexity. Such an approach
reduced the watermark embedding time from the order of several minutes to the order
of single seconds, even on mobile devices.