{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:15:42Z","timestamp":1763018142652,"version":"3.41.0"},"reference-count":49,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2019,11,30]],"date-time":"2019-11-30T00:00:00Z","timestamp":1575072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"UK Engineering and Physical Sciences Research Council (EPSRC), through a Dorothy Hodgkin Postgraduate Award"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2019,11,30]]},"abstract":"<jats:p>Imperceptibility and robustness are two complementary fundamental requirements of any watermarking algorithm. Low-strength watermarking yields high imperceptibility, but exhibits poor robustness. High-strength watermarking schemes achieve good robustness but often infuse distortions resulting in poor visual quality in host images. This article analyses the embedding distortion for wavelet-based watermarking schemes. We derive the relationship between distortion, measured in mean square error (MSE), and the watermark embedding modification and propose the linear proportionality between MSE and the sum of energy of the selected wavelet coefficients for watermark embedding modification. The initial proposition assumes the orthonormality of discrete wavelet transform. It is further extended for non-orthonormal wavelet kernels using a weighting parameter that follows the energy conservation theorems in wavelet frames. The proposed analysis is verified by experimental results for both non-blind and blind watermarking schemes. Such a model is useful to find the optimum input parameters, including the wavelet kernel, coefficient selection, and subband choices for wavelet domain image watermarking.<\/jats:p>","DOI":"10.1145\/3357333","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T13:12:30Z","timestamp":1576501950000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Embedding Distortion Analysis in Wavelet-domain Watermarking"],"prefix":"10.1145","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1762-1578","authenticated-orcid":false,"given":"Deepayan","family":"Bhowmik","sequence":"first","affiliation":[{"name":"University of Stirling, Stirling, United Kingdom"}]},{"given":"Charith","family":"Abhayaratne","sequence":"additional","affiliation":[{"name":"University of Sheffield, Sheffield, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,12,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.3624491"},{"key":"e_1_2_1_2_1","article-title":"Scalable watermark extraction for real-time authentication of JPEG2000 images","volume":"6","author":"Abhayaratne C.","year":"2011","unstructured":"C. Abhayaratne and D. Bhowmik . 2011 . Scalable watermark extraction for real-time authentication of JPEG2000 images . J. Real-Time Image Proc. 6 , 4 (2011), 19 pages. C. Abhayaratne and D. Bhowmik. 2011. Scalable watermark extraction for real-time authentication of JPEG2000 images. J. Real-Time Image Proc. 6, 4 (2011), 19 pages.","journal-title":"J. Real-Time Image Proc."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the International Symposium on Image and Signal Processing and Analysis","volume":"1","author":"Abhayaratne G. C. K.","unstructured":"G. C. K. Abhayaratne and H. Heijmans . 2003. A novel morphological subband decomposition scheme for 2D+t wavelet video coding . In Proceedings of the International Symposium on Image and Signal Processing and Analysis , Vol. 1 . 239--244. G. C. K. Abhayaratne and H. Heijmans. 2003. A novel morphological subband decomposition scheme for 2D+t wavelet video coding. In Proceedings of the International Symposium on Image and Signal Processing and Analysis, Vol. 1. 239--244."},{"key":"e_1_2_1_4_1","first-page":"6","article-title":"Reversible integer-to-integer wavelet transforms for image compression: Performance evaluation and analysis","volume":"9","author":"Adams M. D.","year":"2000","unstructured":"M. D. Adams and F. Kossentni . 2000 . Reversible integer-to-integer wavelet transforms for image compression: Performance evaluation and analysis . IEEE Trans. Image Proc. 9 , 6 (June 2000), 1010--1024. DOI:https:\/\/doi.org\/10.1109\/83.846244 10.1109\/83.846244 M. D. Adams and F. Kossentni. 2000. Reversible integer-to-integer wavelet transforms for image compression: Performance evaluation and analysis. IEEE Trans. Image Proc. 9, 6 (June 2000), 1010--1024. DOI:https:\/\/doi.org\/10.1109\/83.846244","journal-title":"IEEE Trans. Image Proc."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6723-9"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.01.019"},{"key":"e_1_2_1_7_1","first-page":"2","article-title":"A robust multibit multiplicative watermark decoder using a vector-based hidden Markov model in wavelet domain","volume":"28","author":"Amini M.","year":"2018","unstructured":"M. Amini , M. O. Ahmad , and M. N. S. Swamy . 2018 . A robust multibit multiplicative watermark decoder using a vector-based hidden Markov model in wavelet domain . IEEE Trans. Circ. Syst. Vid. Technol. 28 , 2 (Feb. 2018), 402--413. M. Amini, M. O. Ahmad, and M. N. S. Swamy. 2018. A robust multibit multiplicative watermark decoder using a vector-based hidden Markov model in wavelet domain. IEEE Trans. Circ. Syst. Vid. Technol. 28, 2 (Feb. 2018), 402--413.","journal-title":"IEEE Trans. Circ. Syst. Vid. Technol."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2017.8052997"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.918570"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2012.02.002"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"D.\n      Bhowmik\n     and \n      C.\n      Abhayaratne\n  . \n  2008\n  . A generalised model for distortion performance analysis of wavelet based watermarking. In Proceedings of the International Workshop on Digital Watermarking (IWDW\u201908) Lecture Notes in Computer Science\n  (LNCS) Vol. \n  5450\n  . 363--378.  D. Bhowmik and C. Abhayaratne. 2008. A generalised model for distortion performance analysis of wavelet based watermarking. In Proceedings of the International Workshop on Digital Watermarking (IWDW\u201908) Lecture Notes in Computer Science (LNCS) Vol. 5450. 363--378.","DOI":"10.1007\/978-3-642-04438-0_31"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings","volume":"7248","author":"Bhowmik D.","unstructured":"D. Bhowmik and C. Abhayaratne . 2009. Embedding distortion modeling for non-orthonormal wavelet based watermarking schemes. In SPIE Wavelet Applications in Industrial Processing VI , Proceedings Vol. 7248 . D. Bhowmik and C. Abhayaratne. 2009. Embedding distortion modeling for non-orthonormal wavelet based watermarking schemes. In SPIE Wavelet Applications in Industrial Processing VI, Proceedings Vol. 7248."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0334-0"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2599785"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2627241"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2004.833165"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the International Symposium on Multimedia Software Engineering. 80--87","author":"Chen T.-S.","year":"2003","unstructured":"T.-S. Chen , J. Chen , and J.-G. Chen . 2003 . A simple and efficient watermarking technique based on JPEG2000 codec . In Proceedings of the International Symposium on Multimedia Software Engineering. 80--87 . T.-S. Chen, J. Chen, and J.-G. Chen. 2003. A simple and efficient watermarking technique based on JPEG2000 codec. In Proceedings of the International Symposium on Multimedia Software Engineering. 80--87."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0196306"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpa.3160410705"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.57199"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02476026"},{"key":"e_1_2_1_22_1","first-page":"319","article-title":"JPSEC for secure imaging in JPEG2000. In SPIE Applications of Digital Image Processing XXVII","volume":"5558","author":"Dufaux F.","year":"2004","unstructured":"F. Dufaux , S. J. Wee , J. G. Apostolopoulos , and T. Ebrahimi . 2004 . JPSEC for secure imaging in JPEG2000. In SPIE Applications of Digital Image Processing XXVII , Proceedings Vol. 5558-1 . 319 -- 330 . F. Dufaux, S. J. Wee, J. G. Apostolopoulos, and T. Ebrahimi. 2004. JPSEC for secure imaging in JPEG2000. In SPIE Applications of Digital Image Processing XXVII, Proceedings Vol. 5558-1. 319--330.","journal-title":"Proceedings"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the IEEE International Conference on Image Processing (ICIP\u201901)","volume":"2","author":"Ejima M.","unstructured":"M. Ejima and A. Miyazaki . 2001. On the evaluation of performance of digital watermarking in the frequency domain . In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201901) , Vol. 2 . 546--549. M. Ejima and A. Miyazaki. 2001. On the evaluation of performance of digital watermarking in the frequency domain. In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201901), Vol. 2. 546--549."},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the IEEE International Conference on Image Processing (ICIP\u201904)","volume":"4","author":"Fujiyoshi M.","unstructured":"M. Fujiyoshi and H. Kiya . 2004. An image-quality guaranteed method for quantization-based watermarking using a DWT . In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201904) , Vol. 4 . 2629--2632. M. Fujiyoshi and H. Kiya. 2004. An image-quality guaranteed method for quantization-based watermarking using a DWT. In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201904), Vol. 4. 2629--2632."},{"volume-title":"Proceedings of the International Conference on Parallel and Distributed Computing: Applications and Technologies (PDCAT\u201905)","author":"Gong Q.","key":"e_1_2_1_25_1","unstructured":"Q. Gong and H. Shen . 2005. Toward blind logo watermarking in JPEG-compressed images . In Proceedings of the International Conference on Parallel and Distributed Computing: Applications and Technologies (PDCAT\u201905) . 1058--1062. Q. Gong and H. Shen. 2005. Toward blind logo watermarking in JPEG-compressed images. In Proceedings of the International Conference on Parallel and Distributed Computing: Applications and Technologies (PDCAT\u201905). 1058--1062."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1996.544089"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.877211"},{"volume-title":"Proceedings of the IEEE International Conference on Image Processing (ICIP\u201906)","author":"Huo F.","key":"e_1_2_1_28_1","unstructured":"F. Huo and X. Gao . 2006. A wavelet based image watermarking scheme . In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201906) . 2573--2576. F. Huo and X. Gao. 2006. A wavelet based image watermarking scheme. In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201906). 2573--2576."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2006.358.363"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the IEEE International Conference on Image Processing (ICIP\u201999)","volume":"2","author":"Kim J. R.","unstructured":"J. R. Kim and Y. S. Moon . 1999. A robust wavelet-based digital watermarking using level-adaptive thresholding . In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201999) , Vol. 2 . 226--230. J. R. Kim and Y. S. Moon. 1999. A robust wavelet-based digital watermarking using level-adaptive thresholding. In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201999), Vol. 2. 226--230."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.859323"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP\u201998)","volume":"5","author":"Kundur D.","unstructured":"D. Kundur and D. Hatzinakos . 1998. Digital watermarking using multiresolution wavelet decomposition . In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP\u201998) , Vol. 5 . 2969--2972. D. Kundur and D. Hatzinakos. 1998. Digital watermarking using multiresolution wavelet decomposition. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP\u201998), Vol. 5. 2969--2972."},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE\u201901)","volume":"1","author":"Kwon O.","unstructured":"O. Kwon and C. Lee . 2001. Objective method for assessment of video quality using wavelets . In Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE\u201901) , Vol. 1 . 292--295. O. Kwon and C. Lee. 2001. Objective method for assessment of video quality using wavelets. In Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE\u201901), Vol. 1. 292--295."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2633878"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2014.0965"},{"volume-title":"A Wavelet Tour of Signal Processing","author":"Mallat S.","key":"e_1_2_1_37_1","unstructured":"S. Mallat . 1999. A Wavelet Tour of Signal Processing . Academic Press . S. Mallat. 1999. A Wavelet Tour of Signal Processing. Academic Press."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35413-2_6"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04438-0_6"},{"volume-title":"Proceedings of the 7th Workshop on Multimedia and Security (MM8Sec\u201905)","author":"Piper A.","key":"e_1_2_1_40_1","unstructured":"A. Piper , R. Safavi-Naini , and A. Mertins . 2005. Resolution and quality scalable spread spectrum image watermarking . In Proceedings of the 7th Workshop on Multimedia and Security (MM8Sec\u201905) . 79--90. A. Piper, R. Safavi-Naini, and A. Mertins. 2005. Resolution and quality scalable spread spectrum image watermarking. In Proceedings of the 7th Workshop on Multimedia and Security (MM8Sec\u201905). 79--90."},{"key":"e_1_2_1_41_1","first-page":"2","article-title":"A wavelet-based watermarking scheme for color images","volume":"5","author":"Saxena V.","year":"2013","unstructured":"V. Saxena , M. Gupta , and D. T. Gupta . 2013 . A wavelet-based watermarking scheme for color images . IUP J. Telecommun. 5 , 2 (Oct. 2013), 56--66. V. Saxena, M. Gupta, and D. T. Gupta. 2013. A wavelet-based watermarking scheme for color images. IUP J. Telecommun. 5, 2 (Oct. 2013), 56--66.","journal-title":"IUP J. Telecommun."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896304"},{"key":"e_1_2_1_43_1","volume-title":"JPEG2000 Image Compression Fundamentals, Standards and Practice: Image Compression Fundamentals, Standards and Practice.","volume":"642","author":"Taubman D.","unstructured":"D. Taubman and M. Marcellin . 2012 . JPEG2000 Image Compression Fundamentals, Standards and Practice: Image Compression Fundamentals, Standards and Practice. Vol. 642 . Springer Science 8 Business Media. D. Taubman and M. Marcellin. 2012. JPEG2000 Image Compression Fundamentals, Standards and Practice: Image Compression Fundamentals, Standards and Practice. Vol. 642. Springer Science 8 Business Media."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-013-0603-6"},{"key":"e_1_2_1_45_1","unstructured":"M. Vetterli and J. Kova\u010devic. 1995. Wavelets and Subband Coding. Prentice-Hall Inc. Upper Saddle River NJ.  M. Vetterli and J. Kova\u010devic. 1995. Wavelets and Subband Coding. Prentice-Hall Inc. Upper Saddle River NJ."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.2514\/6.1993-4512"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1364\/OE.3.000497"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the IEEE International Conference on Image Processing (ICIP\u201998)","volume":"2","author":"Xie L.","unstructured":"L. Xie and G. R. Arce . 1998. Joint wavelet compression and authentication watermarking . In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201998) , Vol. 2 . 427--431. L. Xie and G. R. Arce. 1998. Joint wavelet compression and authentication watermarking. In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201998), Vol. 2. 427--431."},{"key":"e_1_2_1_50_1","first-page":"127","article-title":"Embedding strategy of image watermarking in wavelet transform domain. In SPIE Image Compression and Encryption Tech","volume":"4551","author":"Zhang Z.","year":"2001","unstructured":"Z. Zhang and Y. L. Mo . 2001 . Embedding strategy of image watermarking in wavelet transform domain. In SPIE Image Compression and Encryption Tech ., Proceedings Vol. 4551-1 . 127 -- 131 . Z. Zhang and Y. L. Mo. 2001. Embedding strategy of image watermarking in wavelet transform domain. In SPIE Image Compression and Encryption Tech., Proceedings Vol. 4551-1. 127--131.","journal-title":"Proceedings"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357333","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:43Z","timestamp":1750203883000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357333"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,30]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,11,30]]}},"alternative-id":["10.1145\/3357333"],"URL":"https:\/\/doi.org\/10.1145\/3357333","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2019,11,30]]},"assertion":[{"value":"2019-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}