Skip to main content

Adaptive Robust Watermarking Method Based on Deep Neural Networks

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13825))

Included in the following conference series:

  • 540 Accesses

Abstract

Aiming at the problem of digital multimedia piracy and infringement, an adaptive robust watermarking algorithm based on Deep Neural Networks (DNNs) is proposed. In our method, the watermark sequence to be embedded is mapped to a noise pattern first, which has the same dimension as the carrier image. Specifically, the noise pattern is generated adaptively according to the statistical properties of the carrier image, in which the noise intensity corresponding to the texture area of the carrier image is large, and that corresponding to the smooth area is small. Thus, after adding the generated noise pattern to the carrier image, good visual quality can be easily obtained. Furthermore, considering a series of attacks such as adding noise and JPEG compression, the watermark encoder and decoder in our scheme are jointly trained to resist the potential attacks in the physical world. Experimental results demonstrate that better visual quality and higher robustness can be obtained compared with those state-of-the-art algorithms based on DNNs. This means that we have better solved the problem of mutual restriction between visual quality and robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zhang, C., Lin, C., Benz, P., et al.: A brief survey on deep learning based data hiding, steganography and watermarking. arXiv preprint arXiv:2103.01607 (2021)

  2. Zhang, C., Benz, P., Karjauv, A., et al.: Universal adversarial perturbations through the lens of deep steganography: towards a Fourier perspective. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 3296–3304 (2021)

    Google Scholar 

  3. Hayes, J., Danezis, G.: Generating steganographic images via adversarial training. In: Advances in Neural Information Processing Systems, pp. 1954–1963 (2017)

    Google Scholar 

  4. Baluja, S.: Hiding images in plain sight: deep steganography. In: Advances in Neural Information Processing Systems, pp. 2069–2079 (2017)

    Google Scholar 

  5. Baluja, S.: Hiding images within images. IEEE Trans. Pattern Anal. Mach. Intell. 42(7), 1685–1697 (2019)

    Article  Google Scholar 

  6. Yu, C.: Attention based data hiding with generative adversarial networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 1120–1128 (2020)

    Google Scholar 

  7. Zhu, J., Kaplan, R., Johnson, J., et al.: HiDDeN: hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 657–672 (2018)

    Google Scholar 

  8. Ahmadi, M., Norouzi, A., Karimi, N., et al.: ReDMark: framework for residual diffusion watermarking based on deep networks. Expert Syst. Appl. 146, 113157 (2020)

    Article  Google Scholar 

  9. Liu, Y., Guo, M., Zhang, J., et al.: A novel two-stage separable deep learning framework for practical blind watermarking. In: Proceedings of the 27th ACM International Conference on Multimedia, pp. 1509–1517 (2019)

    Google Scholar 

  10. Zhang, C., Karjauv, A., Benz, P., et al.: Towards robust data hiding against (JPEG) compression: a pseudo-differentiable deep learning approach. arXiv preprint arXiv:2101.00973 (2020)

  11. Tancik, M., Mildenhall, B., Ng, R.: Stegastamp: invisible hyperlinks in physical photographs. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2117–2126 (2020)

    Google Scholar 

  12. Wengrowski, E., Dana, K.: Light field messaging with deep photographic steganography. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1515–1524 (2019)

    Google Scholar 

  13. Luo, X., Zhan, R., Chang, H., et al.: Distortion agnostic deep watermarking. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 13548–13557 (2020)

    Google Scholar 

  14. Cui, H., Bian, H., Zhang, W., et al.: Unseencode: invisible on-screen barcode with image-based extraction. In: IEEE Conference on Computer Communications, IEEE INFOCOM 2019, pp. 1315–1323. IEEE (2019)

    Google Scholar 

  15. Zhang, C., Benz, P., Karjauv, A., et al.: UDH: universal deep hiding for steganography, watermarking, and light field messaging. In: Advances in Neural Information Processing Systems, pp. 10223–10234 (2020)

    Google Scholar 

  16. Abdelnabi, S., Fritz, M.: Adversarial watermarking transformer: towards tracing text provenance with data hiding. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 121–140. IEEE (2021)

    Google Scholar 

  17. Zhou, Z., Siddiquee, M.M.R., Tajbakhsh, N., et al.: UNet++: redesigning skip connections to exploit multiscale features in image segmentation. IEEE Trans. Med. Imaging 39(6), 1856–1867 (2019)

    Article  Google Scholar 

  18. Shen, B., Sethi, I.K., Bhaskaran, V.: DCT domain alpha blending. In: Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), pp. 857–861. IEEE (1998)

    Google Scholar 

  19. Zhang, R., Isola, P., Efros, A., et al.: The unreasonable effectiveness of deep features as a perceptual metric. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 586–595 (2018)

    Google Scholar 

  20. Huiskes, M.J., Lew, M.S.: The MIR Flickr retrieval evaluation. In: Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval, pp. 39–43 (2008)

    Google Scholar 

  21. Russakovsky, O., Deng, J., Su, H., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211–252 (2015)

    Article  Google Scholar 

  22. Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)

  23. Huynh-Thu, Q., Ghanbari, M.: Scope of validity of PSNR in image/video quality assessment. Electron. Lett. 44(13), 800–801 (2008)

    Article  Google Scholar 

  24. Wang, Z., Bovik, A.C., Sheikh, H.R., et al.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foun-dation of China (62072481, 61772572), and the Science and Technology Program of Guangzhou, China (202201011587).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fangjun Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, F., Wan, C., Huang, F. (2023). Adaptive Robust Watermarking Method Based on Deep Neural Networks. In: Zhao, X., Tang, Z., Comesaña-Alfaro, P., Piva, A. (eds) Digital Forensics and Watermarking. IWDW 2022. Lecture Notes in Computer Science, vol 13825. Springer, Cham. https://doi.org/10.1007/978-3-031-25115-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25115-3_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25114-6

  • Online ISBN: 978-3-031-25115-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics