Abstract
This paper presents a content-based desynchronization resistant digital image watermarking scheme. The image content is represented by strong important feature points obtained by our robust and improved Harris corner detector. These feature points are more resistant to geometric attacks and are therefore used by the Delaunay triangle matching and image restoration method to reduce synchronization errors. The spread-spectrum-based blind watermark embedding and retrieval scheme is applied in the Fourier domain of each perceptually highly textured subimage. The multiplicative scheme is then used to embed the same copy of the watermark at highly secure mid-frequency positions generated by one-way hash functions with different secret keys. The watermark detection decision is based on the number of matched bits between the recovered and embedded watermarks in embedding subimages. Experimental results demonstrate that our scheme is more robust to desynchronization attacks (i.e., geometric and common image processing attacks) than other peer feature-based approaches.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Peticolas, F., Anderson, R., Kuhn, M.: Attacks on Copyright Marking Systems. In: Proc. of the 2nd Workshop on Information Hiding, pp. 218–238 (1998)
Pereira, S., O’Ruanaidh, J.J.K., Deguillaume, F., Csurka, G., Pun, T.: Template Based Recovery of Fourier-based Watermarks Using Log-Polar and Log-Log Maps. In: Proc. of IEEE Int. Conf. Multimedia Computing Systems, vol. 1, pp. 870–874 (1999)
Pereira, S., Pun, T.: Robust Template Matching for Affine Resistant Image Watermarks. IEEE Trans. on Image Processing. 9(6), 1123–1129 (2000)
Digimarc Corporation, US patent 5,822,436, Photographic Products and Methods Employing Embedded Information
Herrigel, A., Voloshynovskiy, S., Rytsar, Y.B.: Watermark Template Attack. In: Proc. of SPIE Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 394–405 (2001)
O’Ruanaidh, J.J.K., Pun, T.: Rotation, Scale, and Translation Invariant Digital Image Watermarking. In: Proc. of IEEE Int. Conf. on Image Processing, pp. 536–539 (1997)
O’Ruanaidh, J.J.K., Pun, T.: Rotation, Scale, and Translation Invariant Spread Spectrum Digital Image Watermarking. Signal Processing 66, 303–317 (1998)
Zheng, D., Zhao, J., El Saddik, A.: RST-Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correlation. IEEE Trans. on Circuits and Systems for Video Technology. 13(8), 753–765 (2003)
Lin, C.Y., Wu, M., Bloom, J.A., Cox, I.J., Miller, M.L., Lui, Y.M.: Rotation, Scale, and Translation Resilient Watermarking for Images. IEEE Trans. on Image Processing. 10(5), 767–782 (2001)
Alghoniemy, M., Tewfik, A.H.: Geometric Distortion Correction Through Image Normalization. In: Proc. of IEEE Int. Conf. Multimedia Expo., vol. 3, pp. 1291–1294 (2000)
Alghoniemy, M., Tewfik, A.H.: Image Watermarking by Moment Invariants. In: Proc. of IEEE Int. Conf. Image Processing, vol. 2, pp. 73–76 (2000)
Alghoniemy, M., Tewfik, A.H.: Geometric Invariance in Image Watermarking. IEEE Trans. on Image Processing. 13(2), 145–153 (2004)
Kim, H.S., Lee, H.K.: Invariant Image Watermark Using Zernike Moments. IEEE Trans. on Circuit and Systems for Video Technology. 13(8), 766–775 (2003)
Xin, Y., Liao, S., Pawlak, M.: Geometrically Robust Image Watermarking Via Pseudo-Zernike Moments. In: Proc. of Canadian Conf. Electrical and Computer Engineering, vol. 2, pp. 939–942 (2004)
Bas, P., Chassery, J.M., Macq, B.: Geometrically Invariant Watermarking Using Feature Points. IEEE Trans. on Image Processing. 11(9), 1014–1028 (2002)
Seo, J., Yoo, C.: Localized Image Watermarking Based on Feature Points of Scale-Space Representation. Pattern Recognition 37(7), 1365–1375 (2004)
Seo, J., Yoo, C.: Image Watermarking Based on Invariant Regions of Scale-Space Representation. IEEE Trans. on Signal Processing. 54(4), 1537–1549 (2006)
Lee, H., Kim, H., Lee, H.: Robust Image Watermarking Using Local Invariant Features. Optical Engineering 45(3), 1–11 (2006)
Tang, C.W., Hang, H.M.: A Feature-Based Robust Digital Image Watermarking Scheme. IEEE Trans. on Signal Processing. 51(4), 950–959 (2003)
Wang, X., Wu, J., Niu, P.: A New Digital Image Watermarking Algorithm Resilient to Desynchronization Attacks. IEEE Trans. on Information Forensics Security. 2(4), 655–663 (2007)
Harris, C., Stephen, M.: A Combined Corner and Edge Detector. In: Proc. of the 4th Alvey Vision Conf., pp. 147–151 (1988)
Pickholtz, R.L., Schilling, D.L., Milstein, L.B.: Theory of Spread Spectrum Communications – A Tutorial. IEEE Trans. on Communications. COM 30, 855–884 (1982)
Hwang, M.S., Chang, C.C., Hwang, K.F.: A Watermarking Technique Based on One-Way Hashing Functions. IEEE Trans. on Consumer Electronics 25, 286–294 (1999)
Hartung, F., Girod, B.: Watermarking of Uncompressed and Compressed Video. Signal Processing 66, 283–301 (1998)
Pranata, S., Guan, Y.L., Chua, H.C.: BER Formulation for the Blind Retrieval of MPEG Video Watermark. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 91–104. Springer, Heidelberg (2003)
Barni, M., Podilchuk, C.I., Bartolini, F., Delp, E.J.: Watermark Embedding: Hiding a Signal within a Cover Image. IEEE Communications Magazine 39, 102–108 (2001)
Bertin, E., Marchand-Maillet, S., Chassery, J.M.: Optimization in Voronoi Diagrams. Kluwer, Dordrecht (1994)
Barber, C.B., Dobkin, D.P., Huhdanpaa, H.T.: The Quickhull Algorithm for Convex Hulls. ACM Trans. on Mathematical Software. 22(4), 469–483 (1996)
Hsieh, M.S., Tseng, D.C.: Perceptual Digital Watermarking for Image Authentication in Electronic Commerce. Electronic Commerce Research 4, 157–170 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Qi, X., Qi, J. (2009). A Desynchronization Resilient Watermarking Scheme. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security IV. Lecture Notes in Computer Science, vol 5510. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01757-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-01757-5_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01756-8
Online ISBN: 978-3-642-01757-5
eBook Packages: Computer ScienceComputer Science (R0)