Abstract
Aiming at the problem of digital multimedia piracy and infringement, an adaptive robust watermarking algorithm based on Deep Neural Networks (DNNs) is proposed. In our method, the watermark sequence to be embedded is mapped to a noise pattern first, which has the same dimension as the carrier image. Specifically, the noise pattern is generated adaptively according to the statistical properties of the carrier image, in which the noise intensity corresponding to the texture area of the carrier image is large, and that corresponding to the smooth area is small. Thus, after adding the generated noise pattern to the carrier image, good visual quality can be easily obtained. Furthermore, considering a series of attacks such as adding noise and JPEG compression, the watermark encoder and decoder in our scheme are jointly trained to resist the potential attacks in the physical world. Experimental results demonstrate that better visual quality and higher robustness can be obtained compared with those state-of-the-art algorithms based on DNNs. This means that we have better solved the problem of mutual restriction between visual quality and robustness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhang, C., Lin, C., Benz, P., et al.: A brief survey on deep learning based data hiding, steganography and watermarking. arXiv preprint arXiv:2103.01607 (2021)
Zhang, C., Benz, P., Karjauv, A., et al.: Universal adversarial perturbations through the lens of deep steganography: towards a Fourier perspective. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 3296–3304 (2021)
Hayes, J., Danezis, G.: Generating steganographic images via adversarial training. In: Advances in Neural Information Processing Systems, pp. 1954–1963 (2017)
Baluja, S.: Hiding images in plain sight: deep steganography. In: Advances in Neural Information Processing Systems, pp. 2069–2079 (2017)
Baluja, S.: Hiding images within images. IEEE Trans. Pattern Anal. Mach. Intell. 42(7), 1685–1697 (2019)
Yu, C.: Attention based data hiding with generative adversarial networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 1120–1128 (2020)
Zhu, J., Kaplan, R., Johnson, J., et al.: HiDDeN: hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 657–672 (2018)
Ahmadi, M., Norouzi, A., Karimi, N., et al.: ReDMark: framework for residual diffusion watermarking based on deep networks. Expert Syst. Appl. 146, 113157 (2020)
Liu, Y., Guo, M., Zhang, J., et al.: A novel two-stage separable deep learning framework for practical blind watermarking. In: Proceedings of the 27th ACM International Conference on Multimedia, pp. 1509–1517 (2019)
Zhang, C., Karjauv, A., Benz, P., et al.: Towards robust data hiding against (JPEG) compression: a pseudo-differentiable deep learning approach. arXiv preprint arXiv:2101.00973 (2020)
Tancik, M., Mildenhall, B., Ng, R.: Stegastamp: invisible hyperlinks in physical photographs. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2117–2126 (2020)
Wengrowski, E., Dana, K.: Light field messaging with deep photographic steganography. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1515–1524 (2019)
Luo, X., Zhan, R., Chang, H., et al.: Distortion agnostic deep watermarking. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 13548–13557 (2020)
Cui, H., Bian, H., Zhang, W., et al.: Unseencode: invisible on-screen barcode with image-based extraction. In: IEEE Conference on Computer Communications, IEEE INFOCOM 2019, pp. 1315–1323. IEEE (2019)
Zhang, C., Benz, P., Karjauv, A., et al.: UDH: universal deep hiding for steganography, watermarking, and light field messaging. In: Advances in Neural Information Processing Systems, pp. 10223–10234 (2020)
Abdelnabi, S., Fritz, M.: Adversarial watermarking transformer: towards tracing text provenance with data hiding. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 121–140. IEEE (2021)
Zhou, Z., Siddiquee, M.M.R., Tajbakhsh, N., et al.: UNet++: redesigning skip connections to exploit multiscale features in image segmentation. IEEE Trans. Med. Imaging 39(6), 1856–1867 (2019)
Shen, B., Sethi, I.K., Bhaskaran, V.: DCT domain alpha blending. In: Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), pp. 857–861. IEEE (1998)
Zhang, R., Isola, P., Efros, A., et al.: The unreasonable effectiveness of deep features as a perceptual metric. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 586–595 (2018)
Huiskes, M.J., Lew, M.S.: The MIR Flickr retrieval evaluation. In: Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval, pp. 39–43 (2008)
Russakovsky, O., Deng, J., Su, H., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211–252 (2015)
Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)
Huynh-Thu, Q., Ghanbari, M.: Scope of validity of PSNR in image/video quality assessment. Electron. Lett. 44(13), 800–801 (2008)
Wang, Z., Bovik, A.C., Sheikh, H.R., et al.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Acknowledgments
This work was supported by the National Natural Science Foun-dation of China (62072481, 61772572), and the Science and Technology Program of Guangzhou, China (202201011587).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Li, F., Wan, C., Huang, F. (2023). Adaptive Robust Watermarking Method Based on Deep Neural Networks. In: Zhao, X., Tang, Z., Comesaña-Alfaro, P., Piva, A. (eds) Digital Forensics and Watermarking. IWDW 2022. Lecture Notes in Computer Science, vol 13825. Springer, Cham. https://doi.org/10.1007/978-3-031-25115-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-25115-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-25114-6
Online ISBN: 978-3-031-25115-3
eBook Packages: Computer ScienceComputer Science (R0)