Fast Robust Template Matching for Affine Resistant Image Watermarks

  • Shelby Pereira
  • Thierry Pun
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1768)

Abstract

Digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyrighted material. This paper describes a method for the secure and robust copyright protection of digital images. We present an approach for embedding a digital watermark into an image using the Fourier transform. To this watermark is added a template in the Fourier transform domain to render the method robust against general linear transformations. We detail a new algorithm for the accurate and efficient recovery of the template in an image which has undergone a general affine transformation. Furthermore we demonstrate how the template can be used as a tool for asserting the presence of a watermark. We also systematically evaluate the algorithm and present results which demonstrate the robustness of the method against some common image processing operations such as compression, rotation, scaling and aspect ratio changes.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Corvi, M., Nicchiotti, G.: Wavelet based image watermarking for copyright protection. In: Frydrych, M., Parkkinen, J., Visa, A. (eds.) The 10th Scandinavian Conference on Image Analysis, Lappeenranta, Finland, June 1997, pp. 157–163. Pattern Recognition Society of Finland (1997)Google Scholar
  2. 2.
    Cox, I., Killian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. In: Proceedings of the IEEE Int. Conf. on Image Processing ICIP 1996, Lausanne, Switzerland, September 16-19, pp. 243–246 (1996)Google Scholar
  3. 3.
    Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: Can invisible watermark resolve rightful ownerships? In: Fifth Conference on Storage and Retrieval for Image and Video Database, San Jose, CA, USA, February 1997, vol. 3022, pp. 310–321 (1997)Google Scholar
  4. 4.
    Deguillaume, F., Csurka, G., Ó Ruanaidh, J.J.K., Pun, T.: Robust 3d dft video watermarking. In: S&T/SPIE Electronic Imaging’99, Session: Security and Watermarking of Multimedia Contents, San Jose, CA, USA (January 1999)Google Scholar
  5. 5.
    Delaigle, J.F., De Vleeschouwer, C., Macq, B.: Watermarking algorithm based on a human visual model. Signal Processing 66, 319–335 (1998)MATHCrossRefGoogle Scholar
  6. 6.
    Frigo, M., Johnson, S.: fftw-1.3. MIT, Boston (1997-1998)Google Scholar
  7. 7.
    Herrigel, A., Ó Ruanaidh, J.J.K., Petersen, H., Pereira, S., Pun, T.: Secure copyright protection techniques for digital images. In: International Workshop on Information Hiding, Portland, OR, USA (April 1998)Google Scholar
  8. 8.
    Hsu, C.-T., Wu, J.-L.: Hidden digital watermarks in images. IEEE Transactions on Image Processing 8(l), 58–68 (1999)Google Scholar
  9. 9.
    Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Electronic Imaging 1999, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, January 1999, vol. 3657, pp. 219–239 (1999)Google Scholar
  10. 10.
    Matsui, K., Tanaka, K.: Video-Steganography: How to secretly embed a signature in a picture. In: IMA Intellectual Property Project Proceedings, January 1994, pp. 187–206 (1994)Google Scholar
  11. 11.
    Ó Ruanaidh, J.J.K., Csurka, G.: A bayesian approach to spread spectrum watermark detection and secure copyright protection for digital image libraries. In: IEEE Conf. on Computer Vision and Pattern Recognition, Fort Collins, Colorado, USA (June 1999)Google Scholar
  12. 12.
    Ruanaidh, J.J.K.O., Pun, T.: Rotation, scale and translation invariant spread spectrum digital image watermarking. In: Signal Processing, 66th edn., pp. 303–317 (1998) (Special Issue on Copyright Protection and Control, B. Macq and I. Pitas, eds.)Google Scholar
  13. 13.
    Pereira, S., Ruanaidh, J.J.K.Ó., Deguillaume, F., Csurka, G., Pun, T.: Template based recovery of Fourier-based watermarks using Log-polar and Log-log maps. In: Int. Conference on Multimedia Computing and Systems, Special Session on Multimedia Data Security and Watermarking (Juin 1999)Google Scholar
  14. 14.
    Petitcolas, F.A.P. In Stirmark3.0(60) (1999), http://www.cl.cam.ac.uk/fapp2/watermarking/stirmark/
  15. 15.
    Petitcolas, F.A.P., Anderson, R.J.: Attacks on copyright marking systems. In: 2nd International Information Hiding Workshop, Portland, Oregon, USA, pp. 219–239 (1998)Google Scholar
  16. 16.
    Pitas, I.: A method for signature casting on digital images. In: Proceedings of the IEEE Int. Conf. on Image Processing ICIP 1996, Lausanne, Switzerland, September 16-19, pp. 215–218 (1996)Google Scholar
  17. 17.
    Puate, J., Jordan, F.: Using fractal compression scheme to embed a digital signature into an image. In: Proceedings of SPIE Photonics East 1996 Symposium (November 1996)Google Scholar
  18. 18.
    Rhoads, G.B.: Steganography systems. In International Patent WO 96/36163 PCT/US96/06618 (November 1996)Google Scholar
  19. 19.
    Britton Rorabaugh, C.: Error Coding Cookbook: Practical C/C++ Routines and Recipes for Error Detection and Correction. McGraw Hill Text, New York (1996)Google Scholar
  20. 20.
    Swanson, M.D., Zhu, B., Tewfik, A.H.: Multiresolution scene-based video watermarking using perceptual models. IEEE Journal on Selected Areas in Communications 16(4), 540–550 (1998)CrossRefGoogle Scholar
  21. 21.
    Tirkel, A.Z., Osborne, C.F., Hall, T.E.: Image and watermark registration. Signal processing 66, 373–383 (1998)MATHCrossRefGoogle Scholar
  22. 22.
    Voyatzis, G., Pitas, I.: Protecting digital image copyrights: A framework. IEEE Computer Graphics and Applications 19(l), 18–23 (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Shelby Pereira
    • 1
  • Thierry Pun
    • 1
  1. 1.CUIUniversity of GenevaGeneva 4Switzerland

Personalised recommendations