Skip to main content

Adaptive Robust Watermarking Method Based on Deep Neural Networks

  • 148 Accesses

Part of the Lecture Notes in Computer Science book series (LNCS,volume 13825)

Abstract

Aiming at the problem of digital multimedia piracy and infringement, an adaptive robust watermarking algorithm based on Deep Neural Networks (DNNs) is proposed. In our method, the watermark sequence to be embedded is mapped to a noise pattern first, which has the same dimension as the carrier image. Specifically, the noise pattern is generated adaptively according to the statistical properties of the carrier image, in which the noise intensity corresponding to the texture area of the carrier image is large, and that corresponding to the smooth area is small. Thus, after adding the generated noise pattern to the carrier image, good visual quality can be easily obtained. Furthermore, considering a series of attacks such as adding noise and JPEG compression, the watermark encoder and decoder in our scheme are jointly trained to resist the potential attacks in the physical world. Experimental results demonstrate that better visual quality and higher robustness can be obtained compared with those state-of-the-art algorithms based on DNNs. This means that we have better solved the problem of mutual restriction between visual quality and robustness.

Keywords

  • Robust watermarking
  • Adaptive strategy
  • Deep neural networks

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-031-25115-3_11
  • Chapter length: 12 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   54.99
Price excludes VAT (USA)
  • ISBN: 978-3-031-25115-3
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   69.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.

References

  1. Zhang, C., Lin, C., Benz, P., et al.: A brief survey on deep learning based data hiding, steganography and watermarking. arXiv preprint arXiv:2103.01607 (2021)

  2. Zhang, C., Benz, P., Karjauv, A., et al.: Universal adversarial perturbations through the lens of deep steganography: towards a Fourier perspective. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 3296–3304 (2021)

    Google Scholar 

  3. Hayes, J., Danezis, G.: Generating steganographic images via adversarial training. In: Advances in Neural Information Processing Systems, pp. 1954–1963 (2017)

    Google Scholar 

  4. Baluja, S.: Hiding images in plain sight: deep steganography. In: Advances in Neural Information Processing Systems, pp. 2069–2079 (2017)

    Google Scholar 

  5. Baluja, S.: Hiding images within images. IEEE Trans. Pattern Anal. Mach. Intell. 42(7), 1685–1697 (2019)

    CrossRef  Google Scholar 

  6. Yu, C.: Attention based data hiding with generative adversarial networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 1120–1128 (2020)

    Google Scholar 

  7. Zhu, J., Kaplan, R., Johnson, J., et al.: HiDDeN: hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 657–672 (2018)

    Google Scholar 

  8. Ahmadi, M., Norouzi, A., Karimi, N., et al.: ReDMark: framework for residual diffusion watermarking based on deep networks. Expert Syst. Appl. 146, 113157 (2020)

    CrossRef  Google Scholar 

  9. Liu, Y., Guo, M., Zhang, J., et al.: A novel two-stage separable deep learning framework for practical blind watermarking. In: Proceedings of the 27th ACM International Conference on Multimedia, pp. 1509–1517 (2019)

    Google Scholar 

  10. Zhang, C., Karjauv, A., Benz, P., et al.: Towards robust data hiding against (JPEG) compression: a pseudo-differentiable deep learning approach. arXiv preprint arXiv:2101.00973 (2020)

  11. Tancik, M., Mildenhall, B., Ng, R.: Stegastamp: invisible hyperlinks in physical photographs. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2117–2126 (2020)

    Google Scholar 

  12. Wengrowski, E., Dana, K.: Light field messaging with deep photographic steganography. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1515–1524 (2019)

    Google Scholar 

  13. Luo, X., Zhan, R., Chang, H., et al.: Distortion agnostic deep watermarking. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 13548–13557 (2020)

    Google Scholar 

  14. Cui, H., Bian, H., Zhang, W., et al.: Unseencode: invisible on-screen barcode with image-based extraction. In: IEEE Conference on Computer Communications, IEEE INFOCOM 2019, pp. 1315–1323. IEEE (2019)

    Google Scholar 

  15. Zhang, C., Benz, P., Karjauv, A., et al.: UDH: universal deep hiding for steganography, watermarking, and light field messaging. In: Advances in Neural Information Processing Systems, pp. 10223–10234 (2020)

    Google Scholar 

  16. Abdelnabi, S., Fritz, M.: Adversarial watermarking transformer: towards tracing text provenance with data hiding. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 121–140. IEEE (2021)

    Google Scholar 

  17. Zhou, Z., Siddiquee, M.M.R., Tajbakhsh, N., et al.: UNet++: redesigning skip connections to exploit multiscale features in image segmentation. IEEE Trans. Med. Imaging 39(6), 1856–1867 (2019)

    CrossRef  Google Scholar 

  18. Shen, B., Sethi, I.K., Bhaskaran, V.: DCT domain alpha blending. In: Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), pp. 857–861. IEEE (1998)

    Google Scholar 

  19. Zhang, R., Isola, P., Efros, A., et al.: The unreasonable effectiveness of deep features as a perceptual metric. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 586–595 (2018)

    Google Scholar 

  20. Huiskes, M.J., Lew, M.S.: The MIR Flickr retrieval evaluation. In: Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval, pp. 39–43 (2008)

    Google Scholar 

  21. Russakovsky, O., Deng, J., Su, H., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211–252 (2015)

    CrossRef  Google Scholar 

  22. Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)

  23. Huynh-Thu, Q., Ghanbari, M.: Scope of validity of PSNR in image/video quality assessment. Electron. Lett. 44(13), 800–801 (2008)

    CrossRef  Google Scholar 

  24. Wang, Z., Bovik, A.C., Sheikh, H.R., et al.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    CrossRef  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foun-dation of China (62072481, 61772572), and the Science and Technology Program of Guangzhou, China (202201011587).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fangjun Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Li, F., Wan, C., Huang, F. (2023). Adaptive Robust Watermarking Method Based on Deep Neural Networks. In: Zhao, X., Tang, Z., Comesaña-Alfaro, P., Piva, A. (eds) Digital Forensics and Watermarking. IWDW 2022. Lecture Notes in Computer Science, vol 13825. Springer, Cham. https://doi.org/10.1007/978-3-031-25115-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25115-3_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25114-6

  • Online ISBN: 978-3-031-25115-3

  • eBook Packages: Computer ScienceComputer Science (R0)