Skip to main content

A Robust Watermarking Algorithm Using Attack Pattern Analysis

  • Conference paper
Advanced Concepts for Intelligent Vision Systems (ACIVS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 4179))

Abstract

In this paper we propose a method that analyzes attack patterns and extracts watermark after restoring the watermarked image from the geometric attacks. The proposed algorithm consists of a spatial-domain key insertion part for attack analysis and a frequency-domain watermark insertion part using discrete wavelet transform. With the spatial-domain key extracted from the damaged image, the proposed algorithm analyzes distortion and finds the attack pattern. After restoring the damaged image, the algorithm extracts the embedded watermark. By using both spatial domain key and frequency domain watermark, the proposed algorithm can achieve robust watermark extraction against geometrical attacks and image compressions such as JPEG.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kang, X., Huang, J., Shi, Y., Lin, Y.: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits and Systems for Video Technology 13, 776–786 (2003)

    Article  Google Scholar 

  2. Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarking. IEEE Transactions on image processing 9, 1123–1129 (2000)

    Article  Google Scholar 

  3. Liu, H., Liu, J., Huang, J., Huang, D., Shi, Y.Q.: A robust DWT-based blind data hiding algorithm. Circuits and Systems. In: IEEE International Symposium on Circuits and Systems. ISCAS 2002, vol. 2, pp. 672–675 (2002)

    Google Scholar 

  4. Reddy, A.A., Chatterji, B.N.: A new wavelet based logo-watermarking scheme. Pattern Recognition Letters 26, 1019–1027 (2005)

    Article  Google Scholar 

  5. Dawei, Z.L., Guanrong, C., Wenbo, L.: A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons & Fractals 22, 47–54 (2004)

    Article  MATH  Google Scholar 

  6. Kim, Y., Yoo, J., Lee, S., Shin, J., Paik, J., Jung, H.: Adaptive mode decision for H.264 encoder. Electronics Letters 40, 1172–1173 (2004)

    Article  Google Scholar 

  7. Wiegand, T., Sullivan, G., Bjontegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circuit, System for Video Technology 13, 560–576 (2003)

    Article  Google Scholar 

  8. Deguillaume, F., Voloshynovskiy, S., Pun, T.: A method for the estimation and recovering from general affine transform in digital watermarking applications. In: Proc. SPIE: Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 313–322 (2002)

    Google Scholar 

  9. Dugelay, J.L., Petitcolas, F.A.P.: Possible counter-attackers against random geometric distortions. In: Proc. SPIE: Security and Watermarking of Multimedia Contents II, vol. 3971 (2002)

    Google Scholar 

  10. Braudaway, G.W., Minter, F.: Automatic recovery of invisible image watermarks from geometrically distorted images. In: Proc. SPIE: Security and watermarking of multimedia contents I, vol. 3971 (2000)

    Google Scholar 

  11. Kang, X., Huang, J., Shi, Y.Q.: An image watermarking algorithm robust to geometric distortion. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 212–223. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Dong, P., Brankov, J.G., Galatsanos, N.P., Yang, Y., Davoine, F.: Digital watermarking robust to geometric distortions. IEEE Trans. on Image processing 14, 2140–2150 (2005)

    Article  Google Scholar 

  13. Oh, W., Kim, H.: The watermarking evaluation & certification technique of image. Telecommunications Technology Association 90, 95–103 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, D., Kim, T., Lee, S., Paik, J. (2006). A Robust Watermarking Algorithm Using Attack Pattern Analysis. In: Blanc-Talon, J., Philips, W., Popescu, D., Scheunders, P. (eds) Advanced Concepts for Intelligent Vision Systems. ACIVS 2006. Lecture Notes in Computer Science, vol 4179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11864349_69

Download citation

  • DOI: https://doi.org/10.1007/11864349_69

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44630-9

  • Online ISBN: 978-3-540-44632-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics