skip to main content
10.1145/3581783.3612143acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs

Published: 27 October 2023 Publication History

Abstract

Recently, print-resist watermarking has attracted much interest. Many watermarking schemes have been proposed to achieve robustness against printing and camera-capturing. Though these studies have shown promising results overall, they overlook the scenario of film-coating photographs, which is a significant and common scenario in real-world. The film-coating process can introduce severe distortions to the original image and easily incapacitate the watermark. To address this issue, we propose WRAP, a novel Watermarking scheme Robust Against film-coating upon Printed photographs. We first construct a large dataset with 120,000 film-coating images to train a style-transfer-based film-coating simulation network. Based on the network, we propose a comprehensive distortion layer which includes film-coating simulation and common disturbances in the printing and camera-capturing process. With the distortion layer, the entire embedding and extraction network can be trained end-to-end to gain robustness against film-coating upon printed photographs. Extensive experiments demonstrate the superior performances of our model in terms of robustness and generalization capability. Our model outperforms state-of-the-art print-resist watermarking schemes when testing in film-coating scenario and achieves outstanding performance across various datasets, types of films, and cameras. To the best of our knowledge, we are the first to conduct research on digital watermarking in film-coating scenario.

References

[1]
Eirikur Agustsson and Radu Timofte. 2017. Ntire 2017 challenge on single image super-resolution: Dataset and study. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops. 126--135.
[2]
Gordon W Braudaway. 1997. Protecting publicly-available images with an invisible image watermark. In Proceedings of international conference on image processing, Vol. 1. IEEE, 524--527.
[3]
Chia-Sung Chang and Jau-Ji Shen. 2017. Features classification forest: a novel development that is adaptable to robust blind watermarking techniques. IEEE Transactions on Image Processing 26, 8 (2017), 3921--3935.
[4]
Wai C Chu. 2003. DCT-based image watermarking using subsampling. IEEE transactions on multimedia 5, 1 (2003), 34--38.
[5]
Ingemar J Cox, Joe Kilian, F Thomson Leighton, and Talal Shamoon. 1997. Secure spread spectrum watermarking for multimedia. IEEE transactions on image processing 6, 12 (1997), 1673--1687.
[6]
Jia Deng,Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009. Imagenet: A large-scale hierarchical image database. In 2009 IEEE conference on computer vision and pattern recognition. Ieee, 248--255.
[7]
Han Fang, Dongdong Chen, Feng Wang, Zehua Ma, Honggu Liu, Wenbo Zhou, Weiming Zhang, and Nenghai Yu. 2021. Tera: Screen-to-camera image code with transparency, efficiency, robustness and adaptability. IEEE Transactions on Multimedia 24 (2021), 955--967.
[8]
Han Fang, Zhaoyang Jia, Zehua Ma, Ee-Chien Chang, and Weiming Zhang. 2022. PIMoG: An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning- Based Watermarking Network. In Proceedings of the 30th ACM International Conference on Multimedia. 2267--2275.
[9]
Han Fang, Weiming Zhang, Hang Zhou, Hao Cui, and Nenghai Yu. 2018. Screenshooting resilient watermarking. IEEE Transactions on Information Forensics and Security 14, 6 (2018), 1403--1418.
[10]
Chiou-Ting Hsu and Ja-Ling Wu. 1999. Hidden digital watermarks in images. IEEE Transactions on image processing 8, 1 (1999), 58--68.
[11]
Runwen Hu and Shijun Xiang. 2020. Cover-lossless robust image watermarking against geometric deformations. IEEE Transactions on Image Processing 30 (2020), 318--331.
[12]
Jun Jia, Zhongpai Gao, Dandan Zhu, Xiongkuo Min, Guangtao Zhai, and Xiaokang Yang. 2022. Learning Invisible Markers for Hidden Codes in Offline-to-online Photography. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2273--2282.
[13]
Irene G Karybali and Kostas Berberidis. 2006. Efficient spatial image watermarking via new perceptual masking and blind detection schemes. IEEE Transactions on Information Forensics and security 1, 2 (2006), 256--274.
[14]
Daming Li, Lianbing Deng, Brij Bhooshan Gupta, Haoxiang Wang, and Chang Choi. 2019. A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Information Sciences 479 (2019), 432--447.
[15]
Xiyang Luo, Ruohan Zhan, Huiwen Chang, Feng Yang, and Peyman Milanfar. 2020. Distortion agnostic deep watermarking. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 13548--13557.
[16]
Benjamin Mathon, François Cayre, Patrick Bas, and Benoît Macq. 2014. Optimal transport for secure spread-spectrum watermarking of still images. IEEE Transactions on Image Processing 23, 4 (2014), 1694--1705.
[17]
Omkar M Parkhi, Andrea Vedaldi, and Andrew Zisserman. 2015. Deep face recognition. (2015).
[18]
Olaf Ronneberger, Philipp Fischer, and Thomas Brox. 2015. U-net: Convolutional networks for biomedical image segmentation. In Medical Image Computing and Computer-Assisted Intervention--MICCAI 2015: 18th International Conference, Munich, Germany, October 5-9, 2015, Proceedings, Part III 18. Springer, 234--241.
[19]
Richard Shin and Dawn Song. 2017. Jpeg-resistant adversarial images. In NIPS 2017 Workshop on Machine Learning and Computer Security, Vol. 1. 8.
[20]
Karen Simonyan and AndrewZisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).
[21]
Matthew Tancik, Ben Mildenhall, and Ren Ng. 2020. Stegastamp: Invisible hyperlinks in physical photographs. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2117--2126.
[22]
Huawei Tian, Yao Zhao, Rongrong Ni, Lunming Qin, and Xuelong Li. 2013. LDFT-based watermarking resilient to local desynchronization attacks. IEEE Transactions on cybernetics 43, 6 (2013), 2190--2201.
[23]
Xiang Wang, Xiaolong Li, and Qingqi Pei. 2019. Independent embedding domain based two-stage robust reversible watermarking. IEEE Transactions on Circuits and Systems for Video Technology 30, 8 (2019), 2406--2417.
[24]
Eric Wengrowski and Kristin Dana. 2019. Light field messaging with deep photographic steganography. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 1515--1524.
[25]
Chaoning Zhang, Philipp Benz, Adil Karjauv, Geng Sun, and In So Kweon. 2020. Udh: Universal deep hiding for steganography, watermarking, and light field messaging. Advances in Neural Information Processing Systems 33 (2020), 10223-- 10234.
[26]
Richard Zhang, Phillip Isola, Alexei A Efros, Eli Shechtman, and Oliver Wang. 2018. The unreasonable effectiveness of deep features as a perceptual metric. In Proceedings of the IEEE conference on computer vision and pattern recognition. 586--595.
[27]
Xin Zhong, Pei-Chi Huang, Spyridon Mastorakis, and Frank Y Shih. 2020. An automated and robust image watermarking scheme based on deep neural networks. IEEE Transactions on Multimedia 23 (2020), 1951--1961.
[28]
Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei. 2018. Hidden: Hiding data with deep networks. In Proceedings of the European conference on computer vision (ECCV). 657--672.
[29]
Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei A Efros. 2017. Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proceedings of the IEEE international conference on computer vision. 2223--2232.
[30]
Tianrui Zong, Yong Xiang, Iynkaran Natgunanathan, Song Guo, Wanlei Zhou, and Gleb Beliakov. 2014. Robust histogram shape-based method for image watermarking. IEEE Transactions on Circuits and Systems for Video Technology 25, 5 (2014), 717--729.

Cited By

View all
  • (2025)Beyond Privacy: Generating Privacy-Preserving Faces Supporting Robust Image AuthenticationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2025.354185920(2564-2576)Online publication date: 2025
  • (2024)Stega-Matting: Irregular Matting Protection via Steganography2024 IEEE International Conference on Multimedia and Expo (ICME)10.1109/ICME57554.2024.10687440(1-6)Online publication date: 15-Jul-2024
  • (2024)Robust Watermarking via Dual Guidance2024 Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)10.1109/APSIPAASC63619.2025.10849088(1-6)Online publication date: 3-Dec-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM '23: Proceedings of the 31st ACM International Conference on Multimedia
October 2023
9913 pages
ISBN:9798400701085
DOI:10.1145/3581783
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 October 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. dataset
  2. film-coating scenario
  3. physical robustness
  4. watermarking

Qualifiers

  • Research-article

Funding Sources

  • China Postdoctoral Science Foundation
  • National Natural Science Foundation of China

Conference

MM '23
Sponsor:
MM '23: The 31st ACM International Conference on Multimedia
October 29 - November 3, 2023
Ottawa ON, Canada

Acceptance Rates

Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)170
  • Downloads (Last 6 weeks)15
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Beyond Privacy: Generating Privacy-Preserving Faces Supporting Robust Image AuthenticationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2025.354185920(2564-2576)Online publication date: 2025
  • (2024)Stega-Matting: Irregular Matting Protection via Steganography2024 IEEE International Conference on Multimedia and Expo (ICME)10.1109/ICME57554.2024.10687440(1-6)Online publication date: 15-Jul-2024
  • (2024)Robust Watermarking via Dual Guidance2024 Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)10.1109/APSIPAASC63619.2025.10849088(1-6)Online publication date: 3-Dec-2024
  • (2024)Robust image hiding network with Frequency and Spatial AttentionsPattern Recognition10.1016/j.patcog.2024.110691155:COnline publication date: 1-Nov-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media