skip to main content
10.1145/3343031.3351025acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking

Published: 15 October 2019 Publication History

Abstract

As a vital copyright protection technology, blind watermarking based on deep learning with an end-to-end encoder-decoder architecture has been recently proposed. Although the one-stage end-to-end training (OET) facilitates the joint learning of encoder and decoder, the noise attack must be simulated in a differentiable way, which is not always applicable in practice. In addition, OET often encounters the problems of converging slowly and tends to degrade the quality of watermarked images under noise attack. In order to address the above problems and improve the practicability and robustness of algorithms, this paper proposes a novel two-stage separable deep learning (TSDL) framework for practical blind watermarking. Precisely, the TSDL framework is composed of noise-free end-to-end adversary training (FEAT) and noise-aware decoder-only training (ADOT). A redundant multi-layer feature encoding network is developed in FEAT to obtain the encoder, while ADOT is used to get the decoder which is robust and practical enough to accept any type of noise. Extensive experiments demonstrate that the proposed framework not only exhibits better stability, greater performance and faster convergence speed compared with current state-of-the-art OET methods, but is also able to resist high-intensity noises that have not been tested in previous works.

References

[1]
Mahdi Ahmadi, Alireza Norouzi, S. M. Reza Soroushmehr, Nader Karimi, Kayvan Najarian, Shadrokh Samavi, and Ali Emami. 2018. ReDMark: Framework for Residual Diffusion Watermarking on Deep Networks. CoRR, Vol. abs/1810.07248 (2018).
[2]
Vinod Nair Alex Krizhevsky and Geoffrey Hinton. 2009a. The CIFAR-10 dataset. https://www.cs.toronto.edu/ kriz/cifar.html .
[3]
Vinod Nair Alex Krizhevsky and Geoffrey Hinton. 2009b. Learning multiple layers of features from tiny images. Tech. Report, Vol. 1 (2009).
[4]
Martin Arjovsky, Soumith Chintala, and Léon Bottou. 2017. Wasserstein GAN. In ICML .
[5]
P. Bao and Xiaohu Ma. 2005. Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Transactions on Circuits and Systems for Video Technology, Vol. 15 (2005).
[6]
N. Bi, Q. Sun, D. Huang, Z. Yang, and J. Huang. 2007. Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition. IEEE Transactions on Image Processing, Vol. 16 (2007).
[7]
Xi Chen, Yan Duan, Rein Houthooft, John Schulman, Ilya Sutskever, and Pieter Abbeel. 2016. InfoGAN: Interpretable Representation Learning by Information Maximizing Generative Adversarial Nets. In Advances in Neural Information Processing Systems .
[8]
Ronan Collobert, Koray Kavukcuoglu, and Clément Farabet. 2011. Torch7: A Matlab-like Environment for Machine Learning. In NIPS .
[9]
Bo Dai, Sanja Fidler, Raquel Urtasun, and Dahua Lin. 2017. Towards Diverse and Natural Image Descriptions via a Conditional GAN. In ICCV .
[10]
T. Dekel, M. Rubinstein, C. Liu, and W. T. Freeman. 2017. On the Effectiveness of Visible Watermarks. In CVPR .
[11]
Jana Dittmann, Mark Stabenau, and Ralf Steinmetz. 1998. Robust MPEG Video Watermarking Technologies. In Proceedings of the Sixth ACM International Conference on Multimedia .
[12]
S. Dumitrescu, Xiaolin Wu, and Zhe Wang. 2003. Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing, Vol. 51 (2003).
[13]
J. Fridrich and M. Goljan and. 2001. Detecting LSB steganography in color, and gray-scale images. IEEE MultiMedia, Vol. 8 (2001).
[14]
Jessica Fridrich and Miroslav Goljan. 2002. Practical Steganalysis of Digital Images - State of the Art. Proceedings of SPIE - The International Society for Optical Engineering, Vol. 4675 (2002).
[15]
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems .
[16]
David Gross-Amblard. 2003. Query-preserving Watermarking of Relational Databases and XML Documents. In Proceedings of the Twenty-second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems .
[17]
Huiping Guo and Nicolas D. Georganas. 2002. Digital Image Watermarking for Joint Ownership. In Proceedings of the Tenth ACM International Conference on Multimedia .
[18]
Jaap Haitsma, Michiel van der Veen, Ton Kalker, and Fons Bruekers. 2000. Audio Watermarking for Monitoring and Copy Protection. In Proceedings of the 2000 ACM Workshops on Multimedia .
[19]
Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, and Mohammed El Hassouni. 2018. Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform. Multimedia Tools and Applications, Vol. 77 (2018).
[20]
K. He, X. Zhang, S. Ren, and J. Sun. 2016. Deep Residual Learning for Image Recognition. In CVPR .
[21]
Phillip Isola, Jun-Yan Zhu, Tinghui Zhou, and Alexei A. Efros. 2017. Image-to-Image Translation with Conditional Adversarial Networks. In CVPR .
[22]
Haribabu Kandi, Deepak Mishra, and Subrahmanyam R.K. Sai Gorthi. 2017. Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Computers & Security, Vol. 65 (2017).
[23]
I. G. Karybali and K. Berberidis. 2006. Efficient spatial image watermarking via new perceptual masking and blind detection schemes. IEEE Transactions on Information Forensics and Security, Vol. 1 (2006).
[24]
Diederik P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. CoRR, Vol. abs/1412.6980 (2015).
[25]
D. Kundur and D. Hatzinakos. 1997. A robust digital image watermarking method using wavelet-based fusion. In Proceedings of International Conference on Image Processing .
[26]
Tsung-Yi Lin, Michael Maire, Serge J. Belongie, Lubomir D. Bourdev, Ross B. Girshick, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, and C. Lawrence Zitnick. 2014. Microsoft COCO: Common Objects in Context. In ECCV .
[27]
Nasrin M. Makbol and Bee Ee Khoo. 2013. Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition. AEU - International Journal of Electronics and Communications, Vol. 67 (2013).
[28]
Mehdi Mirza and Simon Osindero. 2014. Conditional Generative Adversarial Nets. CoRR, Vol. abs/1411.1784 (2014).
[29]
Takeru Miyato, Toshiki Kataoka, Masanori Koyama, and Yuichi Yoshida. 2018. Spectral Normalization for Generative Adversarial Networks. In ICLR .
[30]
Seung-Min Mun, Seung-Hun Nam, Han-Ul Jang, Dongkyu Kim, and Heung-Kyu Lee. 2017. A Robust Blind Watermarking Using Convolutional Neural Network. CoRR, Vol. abs/1704.03248 (2017).
[31]
Seung-Min Mun, Seung-Hun Nam, Haneol Jang, Dongkyu Kim, and Heung-Kyu Lee. 2019. Finding robust domain from attacks: A learning framework for blind watermarking. Neurocomputing, Vol. 337 (2019).
[32]
I. Nasir, Y. Weng, and J. Jiang. 2007. A New Robust Watermarking Scheme for Color Image in Spatial Domain. In Third International IEEE Conference on Signal-Image Technologies and Internet-Based System .
[33]
Hamza Özer, Bülent Sankur, and Nasir Memon. 2005. An SVD-based Audio Watermarking Technique. In Proceedings of the 7th Workshop on Multimedia and Security .
[34]
Alec Radford, Luke Metz, and Soumith Chintala. 2016. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. In ICLR .
[35]
Scott Reed, Zeynep Akata, Xinchen Yan, Lajanugen Logeswaran, Bernt Schiele, and Honglak Lee. 2016. Generative Adversarial Text to Image Synthesis. In ICML .
[36]
Mercan Topkara, Umut Topkara, and Mikhail J. Atallah. 2006. Words Are Not Enough: Sentence Level Natural Language Watermarking. In Proceedings of the 4th ACM International Workshop on Contents Protection and Security .
[37]
Ron van Schyndel, Andrew Tirkel, and Charles F. Osborne. 1994. A Digital Watermark. IEEE International Conference on Image Processing, Vol. 2 (1994).
[38]
Houng-Jyh Mike Wang, Po-Chyi Su, and C.-C. Jay Kuo. 1998. Wavelet-based digital image watermarking. Opt. Express, Vol. 3 (1998).
[39]
Xiang Wei, Zixia Liu, Liqiang Wang, and Boqing Gong. 2018. Improving the Improved Training of Wasserstein GAN. In ICLR .
[40]
Changsheng Xu, Yongwei Zhu, and David Dagan Feng. 2001. Digital Audio Watermarking Based-on Multiple-bit Hopping and Human Auditory System. In Proceedings of the Ninth ACM International Conference on Multimedia .
[41]
Han Zhang, Ian Goodfellow, Dimitris Metaxas, and Augustus Odena. 2018. Self-Attention Generative Adversarial Networks . arXiv e-prints, Vol. abs/1805.08318 (2018).
[42]
Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei. 2018. HiDDeN: Hiding Data With Deep Networks. In ECCV .

Cited By

View all
  • (2025)Robust Image Watermarking With Synchronization Using Template Enhanced-Extracted NetworkIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2024.347402935:2(1602-1614)Online publication date: Feb-2025
  • (2025)C³shartMark: A Chart Watermarking Scheme With Consecutive-Encoding and Concurrent-DecodingIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2024.345453135:1(492-507)Online publication date: Jan-2025
  • (2025)DeMarking: A defense for network flow watermarking in real-timeComputers & Security10.1016/j.cose.2025.104355152(104355)Online publication date: May-2025
  • Show More Cited By

Index Terms

  1. A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM '19: Proceedings of the 27th ACM International Conference on Multimedia
    October 2019
    2794 pages
    ISBN:9781450368896
    DOI:10.1145/3343031
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 October 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. black-box noise
    2. neural networks
    3. robust blind watermarking

    Qualifiers

    • Research-article

    Conference

    MM '19
    Sponsor:

    Acceptance Rates

    MM '19 Paper Acceptance Rate 252 of 936 submissions, 27%;
    Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)272
    • Downloads (Last 6 weeks)13
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Robust Image Watermarking With Synchronization Using Template Enhanced-Extracted NetworkIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2024.347402935:2(1602-1614)Online publication date: Feb-2025
    • (2025)C³shartMark: A Chart Watermarking Scheme With Consecutive-Encoding and Concurrent-DecodingIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2024.345453135:1(492-507)Online publication date: Jan-2025
    • (2025)DeMarking: A defense for network flow watermarking in real-timeComputers & Security10.1016/j.cose.2025.104355152(104355)Online publication date: May-2025
    • (2025)Anti-tampering method of QR code hidden information based on deep learningSignal, Image and Video Processing10.1007/s11760-025-03867-519:4Online publication date: 18-Feb-2025
    • (2025)ED-END: robust watermarking technology based on deep coupling of feature extractorsApplied Intelligence10.1007/s10489-025-06333-455:6Online publication date: 6-Feb-2025
    • (2025)SSRH: screen-shooting robust hyperlink based on deep learningMultimedia Systems10.1007/s00530-025-01689-631:2Online publication date: 5-Feb-2025
    • (2025)Cropping Resistant Watermarking Scheme Using Image Correction Code (ICC)Business Intelligence and Data Analytics10.1007/978-981-97-7717-4_47(655-669)Online publication date: 25-Feb-2025
    • (2024)A Decentralized Digital Watermarking Framework for Secure and Auditable Video Data in Smart Vehicular NetworksFuture Internet10.3390/fi1611039016:11(390)Online publication date: 24-Oct-2024
    • (2024)AGFI-GAN: An Attention-Guided and Feature-Integrated Watermarking Model Based on Generative Adversarial Network Framework for Secure and Auditable Medical Imaging ApplicationElectronics10.3390/electronics1401008614:1(86)Online publication date: 28-Dec-2024
    • (2024)An Audio Watermarking Algorithm Based on Adversarial PerturbationApplied Sciences10.3390/app1416689714:16(6897)Online publication date: 6-Aug-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media