Skip to main content
Log in

Framework for robust blind image watermarking based on classification of attacks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the widespread internet usage, digital contents are easily distributed throughout the world. To eliminate concerns of producers and owners of digital contents, watermarking techniques are extensively being used. Robustness against intentional and unintentional attacks is a major quality of watermarking systems. Since different attacks tend to target different parts of the frequency spectrum, in this paper we propose a framework for blind watermarking which determines the type of attack that the image has gone through before extracting the watermark. Within this framework, we propose an attack classification method to identify the region of the frequency spectrum that is less damaged. The watermark which is redundantly spread throughout the spectrum can be extracted from the less damaged regions. Experimental results show functionality of the framework by producing better results in comparison with well-known blind watermarking techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Akhaee MA, Sahraeian S, Sankur B, Marvasti F (2009) Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Transactions on Multimedia 11(5):822–833

    Article  Google Scholar 

  2. Akhaee MA, Sahraeian SME, Craig J (2011) Blind image watermarking using a sample projection approach. IEEE Transactions on Information Forensics and Security 6(3):883–893

    Article  Google Scholar 

  3. Al-Haj A (2007) Combined DWT-DCT digital image watermarking. J Comput Sci 3(9):740–746

    Article  Google Scholar 

  4. Azzari L, Foi A (2014) Indirect estimation of signal-dependent noise with non-adaptive heterogeneous samples. IEEE Trans Image Process 23(8):3459–3467

    Article  MathSciNet  Google Scholar 

  5. Burgett S, Koch E, Zhao J (1994) A novel method for copyright labeling digitized image data. Technical Report of Fraunhofer Institute for Computer Graphics, Darmstadt

    Google Scholar 

  6. Chen YH, Huang HC (2015) Coevolutionary genetic watermarking for owner identification. Neural Comput & Applic 26(2):291–298

    Article  MathSciNet  Google Scholar 

  7. Chu SC, Huang HC, Shi Y, Wu SY, Shieh CS (2008) Genetic watermarking for zerotree-based applications. Circuits, Systems & Signal Processing 27(2):171–182

    Article  Google Scholar 

  8. Corel Draw Software and Dataset available at: http://www.corel.com

  9. Craver S, Memon N et al (1998) Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 16(4):573–586

    Article  Google Scholar 

  10. Fan Y, Zhu YS, Liu Z (2016) An improved SIFT-based copy-move forgery detection method using T-linkage and multi-scale analysis. Journal of Information Hiding and Multimedia Signal Processing 7(2):399–408

    Google Scholar 

  11. Fazlali HR, Samavi S, Karimi N, Shirani S (2016) Adaptive blind image watermarking using edge pixel concentration. Multimedia Tools and Applications 1:16

    Google Scholar 

  12. Hamghalam M, Mirzakuchaki S, Akhaee MA (2014) Geometric modelling of the wavelet coefficients for image watermarking using optimum detector. IET Image Process 8(3):162–172

    Article  Google Scholar 

  13. Jiang J, Feng G (2002) The spatial relationship of DCT coefficients between a block and its sub-blocks. IEEE Trans Signal Process 50(5):1160–1169

    Article  Google Scholar 

  14. Kang X, Huang J, Zeng W (2008) Improving robustness of quantization-based image watermarking via adaptive receiver. IEEE Transactions on Multimedia 10(6):953–959

    Article  Google Scholar 

  15. Li Z, Yap KH, Lei BY (2011) A new blind robust image watermarking scheme in SVD-DCT composite domain. Proc. of IEEE International Conference on Image Processing (ICIP) 2757–2760

  16. Miller ML, Cox IJ, Linnartz JP, Kalker T (1999) A review of watermarking principles and practices. Digital Signal Processing for Multimedia Systems:461–485

  17. Nasir I, Khelifi F, Jiang J, Ipson S (2012) Robust image watermarking via geometrically invariant feature points and image normalisation. IET Image Process 6(4):354–363

    Article  MathSciNet  Google Scholar 

  18. Oppenheim AV, Schafer RW (2010) Discrete-time signal processing. Pearson Higher Education

  19. Podilchuk CI, Delp EJ (2001) Digital watermarking: algorithms and applications. IEEE Magazine, Signal Processing 18:33–46

    Article  Google Scholar 

  20. Subramanyam AV, Emmanuel S, Kankanhalli MS (2012) Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Transactions on Multimedia 14(3):703–716

    Article  Google Scholar 

  21. Surekha B, Swamy GN (2011) A spatial domain public image watermarking. International Journal of Security and Its Applications 5(1):1–12

    Google Scholar 

  22. Tabatabaei SA, Ur-Rehman O, Zivic N (2015) Secure and robust two-phase image authentication. IEEE Transactions, Multimedia 17(7):945–956

    Article  Google Scholar 

  23. The USC-SIPI Image Database Volume 3, available at: http://sipi.usc.edu/database/database.php?volume=misc

  24. Wang Y, Moulin P (2007) Optimized feature extraction for learning-based image steganalysis. IEEE Transactions on Information Forensics and Security 2(1):31–45

    Article  Google Scholar 

  25. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  26. Wang S, Miyauchi R, Unoki M, Kim NS (2015) Tampering detection scheme for speech signals using formant enhancement based watermarking. Journal of Information Hiding and Multimedia Signal Processing 6:1264–1283

    Google Scholar 

  27. Xinshan Z, Ding J, Dong H et al (2014) Normalized correlation-based quantization modulation for robust watermarking. IEEE Transactions on Multimedia 16(7):1888–1904

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Samavi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Heidari, M., Samavi, S., Soroushmehr, S.M.R. et al. Framework for robust blind image watermarking based on classification of attacks. Multimed Tools Appl 76, 23459–23479 (2017). https://doi.org/10.1007/s11042-016-4150-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4150-3

Keywords

Navigation