Skip to main content

Synchronization Correction Enforced by JPEG Compression in Image Watermarking Scheme for Handheld Mobile Devices

  • Conference paper
  • First Online:
Intelligent Decision Technologies

Abstract

Unauthorized Internet attacks against the watermarked images lead to the impossibility of a blind watermark extraction if the transmitted image is not normalized to its original geometric state. The aim of this study is to detect the regions in the watermarked image robust to rotation, scaling and translation (RST) attacks, enforced by additional immunity to JPEG lossy compression. Our algorithm is based on the simulation of JPEG lossy compression with following extraction of feature points using handcrafted and deep learning approaches. We incorporate JSNet as a JPEG simulator and Key.Net as an enforced way to find feature points invariant to RST attacks. As a result, we select the best anchor points, the coordinates of which are put into the secret key. Applying the same procedure to the transmitted image, we detect and recalculate the positions of the anchor points in the transmitted watermarked image, geometrically synchronizing with the original watermarked image and successfully extract the watermark. To address the mobile aspect, we exploited the simplest deep network architectures as far as the problem allowed with other clarifications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography, 2nd edn. Elsevier, Amsterdam, The Netherlands (2007)

    Google Scholar 

  2. Zhu, H., Liu, M., Li, Y.: The RST invariant digital image watermarking using Radon transforms and complex moments. Dig. Sig. Process. 20, 1612–1628 (2010)

    Article  Google Scholar 

  3. Zhang, Y., Wang, C., Xiao Zhou, X.: RST resilient watermarking scheme based on DWT-SVD and scale-invariant feature transform. Algorithms 10, 41.1–41.21 (2017)

    Google Scholar 

  4. Favorskaya, M., Savchina, E., Gusev, K.: Feature-based synchronization correction for multilevel watermarking of medical images. Proc. Comput. Sci. 159, 1267–1276 (2019)

    Article  Google Scholar 

  5. O’Ruanaidh, J., Pun, T.: Rotation, scale, and translation invariant digital image watermarking. Sig. Process. 66(3), 303–317 (1998)

    Article  Google Scholar 

  6. Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarks. IEEE Trans. Image Process. 9(6), 1123–1129 (2000)

    Article  Google Scholar 

  7. Wang, X.-Y., Yang, Y.-P., Yang, H.-Y.: Invariant image watermarking using multi-scale Harris detector and wavelet moments. Comput. Electr. Eng. 36(1), 31–44 (2010)

    Article  Google Scholar 

  8. Ouyang, J., Coatrieux, G., Chen, B., Shu, H.: Color image watermarking based on quaternion Fourier transform and improved uniform log-polar mapping. Comput. Electr. Eng. 46, 419–432 (2015)

    Article  Google Scholar 

  9. Singhal, N., Lee, Y.-Y., Kim, C.-S., Lee, S.-U.: Robust image watermarking using local Zernike moments. J. Vis. Commun. Image Represent. 20(6), 408–419 (2009)

    Article  Google Scholar 

  10. Shao, Z., Shang, Y., Zhang, Y., Liu, X., Guo, G.: Robust watermarking using orthogonal Fourier-Mellin moments and chaotic map for double images. Sig. Process. 120, 522–531 (2016)

    Article  Google Scholar 

  11. Wang, X.-Y., Wang, A.-L., Yang, H.-Y., Zhang, Y., Wang, C.-P.: A new robust digital watermarking based on exponent moments invariants in nonsubsampled contourlet transform domain. Comput. Electr. Eng. 40(3), 942–955 (2014)

    Article  Google Scholar 

  12. Golabi, S., Helfroush, M.S., Danyali, H.: Non-unit mapped radial moments platform for robust, geometric invariant image watermarking and reversible data hiding. Inf. Sci. 447, 104–116 (2018)

    Article  MathSciNet  Google Scholar 

  13. Kandi, H., Mishra, D., Sai Gorthi, S.R.K. Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Comput. Secur. 65, 247–268 (2017)

    Google Scholar 

  14. Yen, C.T., Huang, Y.J.: Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network. Multimed. Tools Appl. 75(16), 9745–9755 (2016)

    Article  Google Scholar 

  15. Sun, L., Xu, J., Liu, S., Zhang, S., Li, Y., Shen, C.: A robust image watermarking scheme using Arnold transform and BP neural network. Neural Comput. Applic. 30, 2425–2440 (2018)

    Article  Google Scholar 

  16. Mun, S.-M., Nam, S.-H., Jang, H., Kim, D., Lee, H.-K.: Finding robust domain from attacks: a learning framework for blind watermarking. Neurocomputing 337, 191–202 (2019)

    Article  Google Scholar 

  17. Zhu, J., Kaplan, R., Johnson, J., Li Fei-Fei, L.: HiDDeN: hiding data with deep networks. CoRR arXiv preprint, arXiv:1807.09937 (2018)

  18. Hamamoto, I., Kawamura, M.: Neural watermarking method including an attack simulator against rotation and compression attacks. IEICE Trans. Inf. Syst. E103–D(1), 33–41 (2020)

    Google Scholar 

  19. Tsai, J.S., Huang, W.B., Kuo, Y.H.: On the selection of optimal feature region set for robust digital image watermarking. IEEE Trans. Image Process. 20(3), 735–743 (2011)

    Article  MathSciNet  Google Scholar 

  20. Chen, B., Wu, Y., Coatrieux, G., Chen, X., Zheng, Y.: JSNet: a simulation network of JPEG lossy compression and restoration for robust image watermarking against JPEG attack. Comput. Vis. Image Underst. 197–198, 103015.1–103015.9 (2020)

    Google Scholar 

  21. Barroso-Laguna, A., Riba, E., Ponsa, D., Mikolajczyk, K.: Key.Net: keypoint detection by handcrafted and learned CNN filters. IEEE Int. Conf. Computer Vision, pp. 5836–5844. Seoul, Korea (2019)

    Google Scholar 

  22. CLIC Challenge, https://www.compression.cc/challenge/, last accessed 2020/12/25

  23. Favorskaya, M.N., Buryachenko, V.V.: Authentication and copyright protection of videos under transmitting specifications. In: Favorskaya, M.N., Jain, L.C. (eds.) Computer Vision in Advanced Control Systems-5. ISRL, vol. 175, pp. 119–160. Springer, Cham (2020)

    Google Scholar 

Download references

Acknowledgements

The reported study was funded by the Russian Fund for Basic Researches according to the research project no. 19-07-00047.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Margarita N. Favorskaya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Favorskaya, M.N., Buryachenko, V.V. (2021). Synchronization Correction Enforced by JPEG Compression in Image Watermarking Scheme for Handheld Mobile Devices. In: Czarnowski, I., Howlett, R.J., Jain, L.C. (eds) Intelligent Decision Technologies. Smart Innovation, Systems and Technologies, vol 238. Springer, Singapore. https://doi.org/10.1007/978-981-16-2765-1_20

Download citation

Publish with us

Policies and ethics