Skip to main content

Region-Based Watermarking for Images

  • Chapter
  • First Online:
Operations Research, Engineering, and Cyber Security

Abstract

Plain rotation, scaling, and/or translation (RST) of an image can lead to loss of watermark synchronization and thus authentication failure with standard techniques. The block-based approaches in particular, albeit strong against frequency and cropping attacks, are sensitive to geometric distortions due to the need for repositioning the blocks’ rectangular grid of reference. In this paper, we propose a block-based approach for watermarking image objects in a way that is invariant to RST distortions. With the term image object we refer to semantically contiguous parts of images that have a specific contour boundary. The proposed approach is based on shape information since the watermark is embedded in image blocks, the location and orientation of which are defined by Eulerian tours that are appropriately arranged in layers, around the object’s robust skeleton. The object’s robust skeleton is derived by its boundary after applying an extraction technique and not only is invariant to RST transformations but also to cropping, clipping, and other common deformation attacks, difficult to defend with current methods. Experiments using standard benchmark datasets demonstrate the advantages of the proposed scheme in comparison to alternative state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J. Cox, M.L. Miller, J.A. Bloom, Digital Watermarking (Morgan Kaufmann, San Mateo, 2001)

    Google Scholar 

  2. N. Bi, Q. Sun, D. Huang, Z. Yang, J. Huang, Robust image watermarking based on multiband wavelets and empirical mode decomposition. IEEE Trans. Image Process. 16 (8), 1956–1966 (2007)

    Article  MathSciNet  Google Scholar 

  3. I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6 (12), 1673–1687 (1997)

    Article  Google Scholar 

  4. M. Alghoniemy, A.H. Tewfik, Geometric invariance in image watermarking. IEEE Trans. Image Process. 13 (2), 145–153 (2004)

    Article  Google Scholar 

  5. P. Dong, J. Brankov, N. Galatsanos, Y. Yang, Geometric robust watermarking based on a new mesh model correction approach. in IEEE International Conference on Image Processing ICIP (Rochester, New York, 2002)

    Google Scholar 

  6. S. Kay, E. Izquierdo, Robust content based image watermarking. in WIAMIS 2001 - Workshop on Image Analysis for Multimedia Interactive Services, Tampere, Finland, 16–17 May 2001

    Google Scholar 

  7. J. Lichtenauer, I. Setyawan, T. Kalker, R. Lagendijk, Exhaustive geometrical search and false positive watermark detection probability, in SPIE Electronic Imaging 2002, Security and Watermarking of Multimedia Contents V, Santa Clara, January 2003

    Google Scholar 

  8. S. Baudry, P. Nguyen, H. Maître, Estimation of geometric distortions in digital watermarking, in IEEE- ICIP 2002, Rochester, September 2002

    Google Scholar 

  9. D. Delannay, B. Macq, 2-D Periodic patterns for image watermarking, in Advanced Sciences and Technologies for Security Applications, vol. 1 (Springer, New York, 2005), pp. 297–18

    Google Scholar 

  10. M. Alghoniemy, A.H. Tewfik, Progressive quantized projection watermarking scheme, in Proceedings of the 7th ACM International Multimedia Conference, Orlando, FL (1999), pp. 295–298

    Google Scholar 

  11. J. Wang, G. Liu, Y. Dai, J. Sun, Z. Wang, S. Lian, Locally optimum detection for Barni’s multiplicative watermarking in DWT domain. Signal Process. 88 (1), 117–130 (2008)

    Article  MATH  Google Scholar 

  12. W. Lu, H. Lu, F.-L. Chung, Feature based watermarking using watermark template match. Appl. Math. Comput. 177, 377–386 (2006). Elsevier

    Google Scholar 

  13. C. Serdean, M. Ambroze, M. Tomlinson, G. Wade, Dwt based video watermarking for copyright protection invariant to geometrical attacks, in International Symposium on Communication Systems, Networks and Digital Signal Processing, Staffordshire University, UK, 15–17 July 2002

    Google Scholar 

  14. F. Deguillaume, S. Voloshynovskiy, T. Pun, A method for the estimation and recovering from general affine transforms in digital watermarking applications, in SPIE Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, February 2002

    Google Scholar 

  15. J.J.K.O. Ruanaidh, T. Pun, Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Process. 66, 303–318 (1998)

    Article  MATH  Google Scholar 

  16. B.-S. Kim, J.-G. Choi, K.-H. Park, RST-Resistant Image Watermarking Using Invariant Centroid and Reordered Fourier-Mellin Transform. Lecture Notes in Computer Science, vol. 2939 (Springer, New York, 2004), pp. 370–381

    Google Scholar 

  17. C.-Y. Lin, Public watermarking surviving general scaling and cropping: an application for print-and-scan process, in Multimedia and Security Workshop at ACM Multimedia 99, Orlando, FL, October 1999

    Google Scholar 

  18. H. Liu, M. Steinebach, Non-ubiquitous watermarking for image authentication by region of interest masking, in Proceedings of the Picture Coding Symposium, Portugal (2007)

    Google Scholar 

  19. K. Zebbiche, F. Khelifi, Region-based watermarking of biometric images: case study in fingerprint images. Int. J. Digital Multimed. Broadcast. 2008, 1–13 (2008)

    Article  Google Scholar 

  20. X. Guo, T.-G. Zhuang, A region-based lossless watermarking scheme for enhancing security of medical data. J. Digit. Imaging 22 (1), 53–64 (2009). Springer

    Google Scholar 

  21. K. Raftopoulos, K. Ntalianis, P. Tzouveli, N. Tsapatsoulis, A. Parker-Wood, M. Ferecatu, Watermark resynchronization: an efficient approach based on Eulerian tours around a robust skeleton, in Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, 25–26 September 2013

    Google Scholar 

  22. C.Y. Lin, M. Wu, J.A. Bloom, I.J. Cox, M.L. Miller, Y.M. Lui, Rotation, scale, and translation resilient watermarking for images. IEEE Trans. Image Process. 10 (5), 767–82 (2001)

    Article  MATH  Google Scholar 

  23. R.L. Ogniewicz, Discrete Voronoi Skeletons (Swiss Federal Institute of Technology, Zurich, 1992)

    Google Scholar 

  24. T. Sebastian, P. Klein, B. Kimia, Recognition of shapes by editing their Shock graphs. IEEE Pattern Anal. Mach. Intell. 26, 551–57 (2004)

    Article  Google Scholar 

  25. J. Viega, Practical random number generation in software, in Proceedings of the 19th Annual Computer Security Applications Conference, December 2003

    Google Scholar 

  26. J.A. Sethian, A fast marching level set method for monotonically advancing fronts. Proc. Natl. Acad. Sci. 93 (4), 1591–1595 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  27. J.A. Sethian, Level Set Methods and Fast Marching Methods, 2nd edn. (Cambridge University Press, Cambridge, 1999)

    MATH  Google Scholar 

  28. P. Kapsalas, S. Kollias, Affine morphological shape stable boundary regions (SSBR) for image representation, in Proceedings of International Conference on Image Processing (ICIP) 2011, Brussels, September 2011

    Google Scholar 

  29. T.B. Sebastian, P. Klein, B.B. Kimia, Recognition of shapes by editing Shock graphs. Proc. Int. Conf. Comput. Vis. 1, 755–762 (2001)

    Google Scholar 

  30. S.R. Deans, The Radon Transform and Some of Its Applications (Krieger Publishing Company, Malabar, 1983)

    MATH  Google Scholar 

  31. R.O. Duda, P.E. Hart, Use of the hough transformation to detect lines and curves in pictures. Commun. Assoc. Comput. Mach. 15 (1), 11–15 (1972)

    MATH  Google Scholar 

  32. V. Kolmogorov, R. Zabih, What energy functions can be minimized via graph cuts? IEEE Trans. Pattern Anal. Mach. Intell. 26 (2), 147–159 (2004)

    Article  MATH  Google Scholar 

  33. M. Kass, A. Witkin, D. Terzopoulos, Snakes: active contour models. Int. J. Comput. Vis. 1 (4), 321–331 (1988). Springer

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Konstantinos A. Raftopoulos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Raftopoulos, K.A., Papadakis, N., Ntalianis, K.S., Tzouveli, P., Goudelis, G., Kollias, S.D. (2017). Region-Based Watermarking for Images. In: Daras, N., Rassias, T. (eds) Operations Research, Engineering, and Cyber Security. Springer Optimization and Its Applications, vol 113. Springer, Cham. https://doi.org/10.1007/978-3-319-51500-7_15

Download citation

Publish with us

Policies and ethics