The purpose of this page is to make available one subjective quality assessment from IRCCyN/IVC. The experiments were conducted in our lab in normalized conditions.
Content
5 original grayscale images were used, 100 distorted images were generated from 10 watermarking algorithms with 2 embedding strengths.
These algorithms have the advantage to generate very different type of distortions. Subjective evaluations were made at viewing distance of 6 times the screen height using a DSIS (Double Stimulus Impairment Scale) method with 5 categories and 16 observers. Distortions for each processing and each image have been optimised in order to uniformly cover the subjective scale.
Download
Download the IVC-Enrico database (20 MB zip file)
A Microsoft Excel spreadsheet, giving all subjective quality scores is included in the above archive.
How to cite the IVC-Enrico database
If you use BibTeX, here's the citation:
@misc{ivcenricodb,
title = {Evaluation of standard watermarking techniques},
author = {Marini, Enrico, and Autrusseau, Florent, and Le Callet Patrick},
year = {2007},
note = {http://www.irccyn.ec-nantes.fr/~autrusse/Databases/}
}
If you don't use BibTeX, use simply:
Marini, Enrico, and Autrusseau, Florent, and Le Callet Patrick
Evaluation of standard watermarking techniques
http://www.irccyn.ec-nantes.fr/~autrusse/Databases/
Dissemination
This database was used in
- E. Marini, F. Autrusseau, P. Le Callet, P. Campisi, "Evaluation of standard watermarking techniques", in SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose , USA, January 2007.
- P. Le Callet, F. Autrusseau, P. Campisi, "Visibility control and
Quality assessment of watermarking and data hiding algorithms", Chap IX
in Multimedia Forensics and Security, Idea Group Publishing, Editor:
Chang-Tsun Li, pp. 163-192, ISBN: 978-1-59904-869-7, April 2008.
Note
Here is the labeling of the 10 watermarking algorithms:
- A1: Corvi, M. & Nicchiotti, G. (1997). Wavelet based image watermarking for copyright protection. Scandinavian Conference on Image Analysis, SCIA, 9705.
- A2: Cox, I., Kilian, J., Leighton, T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. Proceedings of the IEEE International Conference on Image Processing, 6, 1673–1687.
- A3: Fridrich, J. (1998). Combining low-frequency and spread spectrum watermarking. Proceedings of the SPIE symposium on optical science, Engineering and Instrumentation, vol 3456, San Diego, July 19-24, 1998.
- A4: Kim, J. & Moon, Y. (1999). A robust wavelet based digital watermark using label adaptative thresholding. Proceedings of the 6th IEEE International Conference on Image Processing, 202-205.
- A5: Koch, E. & Zhao, J. (1995). Towards robust and hidden image copyright labeling. IEEE International Workshop on Nonlinear Signal and Image Processing, 452–455.
- A6: Wang, H.-J., Su, P.-C., & JayKuo, C. (1998). Wavelet based digital image watermarking. Optic Express, 3, 491–196.
- A7: Xia, X.-G., Boncelet, C., & Arce, G. (1998). Wavelet transform based watermark for digital images. Optic Express, 3, 497–511.
- A8: Xie, L. & Arce, G. (1998). Joint wavelet compression and authentication watermarking. Proceedings of the IEEE International Conference on Image Processing, 427-431.
- A9: Zhu, W., Xiong, Z., & Zhang, Y.-Q. (1998). Multiresolution watermarking for images and video: a unified approach. Proceedings of the IEEE International Conference on Image Processing, 1, 465-468.
- A10: Autrusseau, F. & Le Callet, P. (2007). A robust image watermarking technique based on quantization noise visibility thresholds. Elsevier Signal Processing, 87(6), 1363–1383.