A Robust Watermarking Algorithm Using Attack Pattern Analysis

  • Dongeun Lee
  • Taekyung Kim
  • Seongwon Lee
  • Joonki Paik
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4179)


In this paper we propose a method that analyzes attack patterns and extracts watermark after restoring the watermarked image from the geometric attacks. The proposed algorithm consists of a spatial-domain key insertion part for attack analysis and a frequency-domain watermark insertion part using discrete wavelet transform. With the spatial-domain key extracted from the damaged image, the proposed algorithm analyzes distortion and finds the attack pattern. After restoring the damaged image, the algorithm extracts the embedded watermark. By using both spatial domain key and frequency domain watermark, the proposed algorithm can achieve robust watermark extraction against geometrical attacks and image compressions such as JPEG.


Watermark Image JPEG Compression Digital Watermark Watermark Algorithm Watermark Extraction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Kang, X., Huang, J., Shi, Y., Lin, Y.: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits and Systems for Video Technology 13, 776–786 (2003)CrossRefGoogle Scholar
  2. 2.
    Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarking. IEEE Transactions on image processing 9, 1123–1129 (2000)CrossRefGoogle Scholar
  3. 3.
    Liu, H., Liu, J., Huang, J., Huang, D., Shi, Y.Q.: A robust DWT-based blind data hiding algorithm. Circuits and Systems. In: IEEE International Symposium on Circuits and Systems. ISCAS 2002, vol. 2, pp. 672–675 (2002)Google Scholar
  4. 4.
    Reddy, A.A., Chatterji, B.N.: A new wavelet based logo-watermarking scheme. Pattern Recognition Letters 26, 1019–1027 (2005)CrossRefGoogle Scholar
  5. 5.
    Dawei, Z.L., Guanrong, C., Wenbo, L.: A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons & Fractals 22, 47–54 (2004)MATHCrossRefGoogle Scholar
  6. 6.
    Kim, Y., Yoo, J., Lee, S., Shin, J., Paik, J., Jung, H.: Adaptive mode decision for H.264 encoder. Electronics Letters 40, 1172–1173 (2004)CrossRefGoogle Scholar
  7. 7.
    Wiegand, T., Sullivan, G., Bjontegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circuit, System for Video Technology 13, 560–576 (2003)CrossRefGoogle Scholar
  8. 8.
    Deguillaume, F., Voloshynovskiy, S., Pun, T.: A method for the estimation and recovering from general affine transform in digital watermarking applications. In: Proc. SPIE: Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 313–322 (2002)Google Scholar
  9. 9.
    Dugelay, J.L., Petitcolas, F.A.P.: Possible counter-attackers against random geometric distortions. In: Proc. SPIE: Security and Watermarking of Multimedia Contents II, vol. 3971 (2002)Google Scholar
  10. 10.
    Braudaway, G.W., Minter, F.: Automatic recovery of invisible image watermarks from geometrically distorted images. In: Proc. SPIE: Security and watermarking of multimedia contents I, vol. 3971 (2000)Google Scholar
  11. 11.
    Kang, X., Huang, J., Shi, Y.Q.: An image watermarking algorithm robust to geometric distortion. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 212–223. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  12. 12.
    Dong, P., Brankov, J.G., Galatsanos, N.P., Yang, Y., Davoine, F.: Digital watermarking robust to geometric distortions. IEEE Trans. on Image processing 14, 2140–2150 (2005)CrossRefGoogle Scholar
  13. 13.
    Oh, W., Kim, H.: The watermarking evaluation & certification technique of image. Telecommunications Technology Association 90, 95–103 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Dongeun Lee
    • 1
  • Taekyung Kim
    • 1
  • Seongwon Lee
    • 2
  • Joonki Paik
    • 1
  1. 1.Image Processing and Intelligent Systems Laboratory, Department of Image Engineering, Graduate School of Advanced Imaging Science, Multimedia, and FilmChung-Ang UniversitySeoulKorea
  2. 2.Department of Computer Engineering, College of Electronics and InformationKwangwoon UniversitySeoulKorea

Personalised recommendations