Skip to main content

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 5510))

Abstract

This paper presents a content-based desynchronization resistant digital image watermarking scheme. The image content is represented by strong important feature points obtained by our robust and improved Harris corner detector. These feature points are more resistant to geometric attacks and are therefore used by the Delaunay triangle matching and image restoration method to reduce synchronization errors. The spread-spectrum-based blind watermark embedding and retrieval scheme is applied in the Fourier domain of each perceptually highly textured subimage. The multiplicative scheme is then used to embed the same copy of the watermark at highly secure mid-frequency positions generated by one-way hash functions with different secret keys. The watermark detection decision is based on the number of matched bits between the recovered and embedded watermarks in embedding subimages. Experimental results demonstrate that our scheme is more robust to desynchronization attacks (i.e., geometric and common image processing attacks) than other peer feature-based approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Peticolas, F., Anderson, R., Kuhn, M.: Attacks on Copyright Marking Systems. In: Proc. of the 2nd Workshop on Information Hiding, pp. 218–238 (1998)

    Google Scholar 

  2. Pereira, S., O’Ruanaidh, J.J.K., Deguillaume, F., Csurka, G., Pun, T.: Template Based Recovery of Fourier-based Watermarks Using Log-Polar and Log-Log Maps. In: Proc. of IEEE Int. Conf. Multimedia Computing Systems, vol. 1, pp. 870–874 (1999)

    Google Scholar 

  3. Pereira, S., Pun, T.: Robust Template Matching for Affine Resistant Image Watermarks. IEEE Trans. on Image Processing. 9(6), 1123–1129 (2000)

    Article  Google Scholar 

  4. Digimarc Corporation, US patent 5,822,436, Photographic Products and Methods Employing Embedded Information

    Google Scholar 

  5. Herrigel, A., Voloshynovskiy, S., Rytsar, Y.B.: Watermark Template Attack. In: Proc. of SPIE Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 394–405 (2001)

    Google Scholar 

  6. O’Ruanaidh, J.J.K., Pun, T.: Rotation, Scale, and Translation Invariant Digital Image Watermarking. In: Proc. of IEEE Int. Conf. on Image Processing, pp. 536–539 (1997)

    Google Scholar 

  7. O’Ruanaidh, J.J.K., Pun, T.: Rotation, Scale, and Translation Invariant Spread Spectrum Digital Image Watermarking. Signal Processing 66, 303–317 (1998)

    Article  MATH  Google Scholar 

  8. Zheng, D., Zhao, J., El Saddik, A.: RST-Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correlation. IEEE Trans. on Circuits and Systems for Video Technology. 13(8), 753–765 (2003)

    Article  Google Scholar 

  9. Lin, C.Y., Wu, M., Bloom, J.A., Cox, I.J., Miller, M.L., Lui, Y.M.: Rotation, Scale, and Translation Resilient Watermarking for Images. IEEE Trans. on Image Processing. 10(5), 767–782 (2001)

    Article  MATH  Google Scholar 

  10. Alghoniemy, M., Tewfik, A.H.: Geometric Distortion Correction Through Image Normalization. In: Proc. of IEEE Int. Conf. Multimedia Expo., vol. 3, pp. 1291–1294 (2000)

    Google Scholar 

  11. Alghoniemy, M., Tewfik, A.H.: Image Watermarking by Moment Invariants. In: Proc. of IEEE Int. Conf. Image Processing, vol. 2, pp. 73–76 (2000)

    Google Scholar 

  12. Alghoniemy, M., Tewfik, A.H.: Geometric Invariance in Image Watermarking. IEEE Trans. on Image Processing. 13(2), 145–153 (2004)

    Article  Google Scholar 

  13. Kim, H.S., Lee, H.K.: Invariant Image Watermark Using Zernike Moments. IEEE Trans. on Circuit and Systems for Video Technology. 13(8), 766–775 (2003)

    Article  Google Scholar 

  14. Xin, Y., Liao, S., Pawlak, M.: Geometrically Robust Image Watermarking Via Pseudo-Zernike Moments. In: Proc. of Canadian Conf. Electrical and Computer Engineering, vol. 2, pp. 939–942 (2004)

    Google Scholar 

  15. Bas, P., Chassery, J.M., Macq, B.: Geometrically Invariant Watermarking Using Feature Points. IEEE Trans. on Image Processing. 11(9), 1014–1028 (2002)

    Article  Google Scholar 

  16. Seo, J., Yoo, C.: Localized Image Watermarking Based on Feature Points of Scale-Space Representation. Pattern Recognition 37(7), 1365–1375 (2004)

    Article  MATH  Google Scholar 

  17. Seo, J., Yoo, C.: Image Watermarking Based on Invariant Regions of Scale-Space Representation. IEEE Trans. on Signal Processing. 54(4), 1537–1549 (2006)

    Article  Google Scholar 

  18. Lee, H., Kim, H., Lee, H.: Robust Image Watermarking Using Local Invariant Features. Optical Engineering 45(3), 1–11 (2006)

    Google Scholar 

  19. Tang, C.W., Hang, H.M.: A Feature-Based Robust Digital Image Watermarking Scheme. IEEE Trans. on Signal Processing. 51(4), 950–959 (2003)

    Article  MathSciNet  Google Scholar 

  20. Wang, X., Wu, J., Niu, P.: A New Digital Image Watermarking Algorithm Resilient to Desynchronization Attacks. IEEE Trans. on Information Forensics Security. 2(4), 655–663 (2007)

    Article  Google Scholar 

  21. Harris, C., Stephen, M.: A Combined Corner and Edge Detector. In: Proc. of the 4th Alvey Vision Conf., pp. 147–151 (1988)

    Google Scholar 

  22. Pickholtz, R.L., Schilling, D.L., Milstein, L.B.: Theory of Spread Spectrum Communications – A Tutorial. IEEE Trans. on Communications. COM 30, 855–884 (1982)

    Article  Google Scholar 

  23. Hwang, M.S., Chang, C.C., Hwang, K.F.: A Watermarking Technique Based on One-Way Hashing Functions. IEEE Trans. on Consumer Electronics 25, 286–294 (1999)

    Article  Google Scholar 

  24. Hartung, F., Girod, B.: Watermarking of Uncompressed and Compressed Video. Signal Processing 66, 283–301 (1998)

    Article  MATH  Google Scholar 

  25. Pranata, S., Guan, Y.L., Chua, H.C.: BER Formulation for the Blind Retrieval of MPEG Video Watermark. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 91–104. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  26. Barni, M., Podilchuk, C.I., Bartolini, F., Delp, E.J.: Watermark Embedding: Hiding a Signal within a Cover Image. IEEE Communications Magazine 39, 102–108 (2001)

    Article  Google Scholar 

  27. Bertin, E., Marchand-Maillet, S., Chassery, J.M.: Optimization in Voronoi Diagrams. Kluwer, Dordrecht (1994)

    Book  Google Scholar 

  28. Barber, C.B., Dobkin, D.P., Huhdanpaa, H.T.: The Quickhull Algorithm for Convex Hulls. ACM Trans. on Mathematical Software. 22(4), 469–483 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  29. Hsieh, M.S., Tseng, D.C.: Perceptual Digital Watermarking for Image Authentication in Electronic Commerce. Electronic Commerce Research 4, 157–170 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Qi, X., Qi, J. (2009). A Desynchronization Resilient Watermarking Scheme. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security IV. Lecture Notes in Computer Science, vol 5510. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01757-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01757-5_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01756-8

  • Online ISBN: 978-3-642-01757-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics