Image-adaptive watermarking using 2D chirps
- 119 Downloads
Linear chirps, a special case of polynomial phase exponentials, have recently been proposed for digital watermarking. In this work, we propose a known-host-state methodology for designing image watermarks that are robust to compression. We use a two-dimensional frequency-modulated chirp as a spreading function in a block-based spatial watermarking scheme. In each block, the chirp is used to embed binary phase information. Chirp parameters allow for spectral shaping of the watermark to match host content. Since host state is known to the embedder, it is possible to tune the chirp for optimum performance, particularly against compression. In contrast to existing chirp watermarking where only a single watermark is generally embedded, the proposed block chirp watermarking allows for a much higher payload. Detection is done using chirp transform subject to key exchange for security. We show that the proposed method significantly outperforms non-adaptive watermarking across all compression factors under variety of attacks.
KeywordsDigital watermarking Time–frequency Chirp Frequency-modulated function Compression Attack
Unable to display preview. Download preview PDF.
- 5.Mobasseri, B.G.: Digital watermarking in the joint time– frequency domain. In: Proc. IEEE International Conference on Image Processing, vol. 3, pp. 481–484 (2002)Google Scholar
- 6.Mobasseri, B., Zhang, Y., Dogahe, B.M., Amin, M.G.: Designing robust watermarks using polynomial phase exponentials. In: IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Philadelphia, PA, March (2005)Google Scholar
- 7.Zhang, Y., Dogahe, B.M., Amin, M.G., Mobasseri, B.: Digital watermarking using two-dimensional FM waveforms. In: Advanced Signal Processing Algorithms, Architectures, and Implementations XIV, vol. 5599, pp. 277–288. SPIE (2004)Google Scholar
- 8.Aviyente, S., Al-khassaweneh, M.: Robust watermarking in the joint spatial-spectral domain. IEEE Digital Signal Processing Workshop, Taos Ski Valley, NM (2004)Google Scholar
- 9.Barkat B., Sattar F.: A new time–frequency based private fragile watermarking scheme for image authentication. IEEE Int. Symp. Signal Processing Appl. 2, 363–366 (2003)Google Scholar
- 15.Cohen L.: Time–Frequency Analysis. Prentice Hall, Upper Saddle River (1995)Google Scholar
- 16.Papandreou-Suppappola A.: Applications in Time–Frequency Signal Processing. CRC Press, Boca Raton (2003)Google Scholar
- 20.Ebrahimi F., Chamik M., Winkler S.: JPEG vs. JPEG 2000: an objective comparison of image encoding quality. Proc. SPIE Appl. Digital Image Processing XXVII 5558, 303–308 (2004)Google Scholar
- 21.Watson, A.B.: Visula optimization of DCT quantization matrices for individual images. In: Proc. AIAA Computing in Aerospace, vol. 9, pp. 286–291, San Diego, CA (1993)Google Scholar
- 22.Fleming, C.E., Mobasseri, B.G.: Compression and rotation resistant watermark using a circular chirp structure. In: Proc. SPIE Conference Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, Jan. (2006)Google Scholar