Abstract
In this paper we propose a method that analyzes attack patterns and extracts watermark after restoring the watermarked image from the geometric attacks. The proposed algorithm consists of a spatial-domain key insertion part for attack analysis and a frequency-domain watermark insertion part using discrete wavelet transform. With the spatial-domain key extracted from the damaged image, the proposed algorithm analyzes distortion and finds the attack pattern. After restoring the damaged image, the algorithm extracts the embedded watermark. By using both spatial domain key and frequency domain watermark, the proposed algorithm can achieve robust watermark extraction against geometrical attacks and image compressions such as JPEG.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kang, X., Huang, J., Shi, Y., Lin, Y.: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits and Systems for Video Technology 13, 776–786 (2003)
Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarking. IEEE Transactions on image processing 9, 1123–1129 (2000)
Liu, H., Liu, J., Huang, J., Huang, D., Shi, Y.Q.: A robust DWT-based blind data hiding algorithm. Circuits and Systems. In: IEEE International Symposium on Circuits and Systems. ISCAS 2002, vol. 2, pp. 672–675 (2002)
Reddy, A.A., Chatterji, B.N.: A new wavelet based logo-watermarking scheme. Pattern Recognition Letters 26, 1019–1027 (2005)
Dawei, Z.L., Guanrong, C., Wenbo, L.: A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons & Fractals 22, 47–54 (2004)
Kim, Y., Yoo, J., Lee, S., Shin, J., Paik, J., Jung, H.: Adaptive mode decision for H.264 encoder. Electronics Letters 40, 1172–1173 (2004)
Wiegand, T., Sullivan, G., Bjontegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circuit, System for Video Technology 13, 560–576 (2003)
Deguillaume, F., Voloshynovskiy, S., Pun, T.: A method for the estimation and recovering from general affine transform in digital watermarking applications. In: Proc. SPIE: Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 313–322 (2002)
Dugelay, J.L., Petitcolas, F.A.P.: Possible counter-attackers against random geometric distortions. In: Proc. SPIE: Security and Watermarking of Multimedia Contents II, vol. 3971 (2002)
Braudaway, G.W., Minter, F.: Automatic recovery of invisible image watermarks from geometrically distorted images. In: Proc. SPIE: Security and watermarking of multimedia contents I, vol. 3971 (2000)
Kang, X., Huang, J., Shi, Y.Q.: An image watermarking algorithm robust to geometric distortion. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 212–223. Springer, Heidelberg (2003)
Dong, P., Brankov, J.G., Galatsanos, N.P., Yang, Y., Davoine, F.: Digital watermarking robust to geometric distortions. IEEE Trans. on Image processing 14, 2140–2150 (2005)
Oh, W., Kim, H.: The watermarking evaluation & certification technique of image. Telecommunications Technology Association 90, 95–103 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, D., Kim, T., Lee, S., Paik, J. (2006). A Robust Watermarking Algorithm Using Attack Pattern Analysis. In: Blanc-Talon, J., Philips, W., Popescu, D., Scheunders, P. (eds) Advanced Concepts for Intelligent Vision Systems. ACIVS 2006. Lecture Notes in Computer Science, vol 4179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11864349_69
Download citation
DOI: https://doi.org/10.1007/11864349_69
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44630-9
Online ISBN: 978-3-540-44632-3
eBook Packages: Computer ScienceComputer Science (R0)