Abstract
Plain rotation, scaling, and/or translation (RST) of an image can lead to loss of watermark synchronization and thus authentication failure with standard techniques. The block-based approaches in particular, albeit strong against frequency and cropping attacks, are sensitive to geometric distortions due to the need for repositioning the blocks’ rectangular grid of reference. In this paper, we propose a block-based approach for watermarking image objects in a way that is invariant to RST distortions. With the term image object we refer to semantically contiguous parts of images that have a specific contour boundary. The proposed approach is based on shape information since the watermark is embedded in image blocks, the location and orientation of which are defined by Eulerian tours that are appropriately arranged in layers, around the object’s robust skeleton. The object’s robust skeleton is derived by its boundary after applying an extraction technique and not only is invariant to RST transformations but also to cropping, clipping, and other common deformation attacks, difficult to defend with current methods. Experiments using standard benchmark datasets demonstrate the advantages of the proposed scheme in comparison to alternative state-of-the-art methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
J. Cox, M.L. Miller, J.A. Bloom, Digital Watermarking (Morgan Kaufmann, San Mateo, 2001)
N. Bi, Q. Sun, D. Huang, Z. Yang, J. Huang, Robust image watermarking based on multiband wavelets and empirical mode decomposition. IEEE Trans. Image Process. 16 (8), 1956–1966 (2007)
I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6 (12), 1673–1687 (1997)
M. Alghoniemy, A.H. Tewfik, Geometric invariance in image watermarking. IEEE Trans. Image Process. 13 (2), 145–153 (2004)
P. Dong, J. Brankov, N. Galatsanos, Y. Yang, Geometric robust watermarking based on a new mesh model correction approach. in IEEE International Conference on Image Processing ICIP (Rochester, New York, 2002)
S. Kay, E. Izquierdo, Robust content based image watermarking. in WIAMIS 2001 - Workshop on Image Analysis for Multimedia Interactive Services, Tampere, Finland, 16–17 May 2001
J. Lichtenauer, I. Setyawan, T. Kalker, R. Lagendijk, Exhaustive geometrical search and false positive watermark detection probability, in SPIE Electronic Imaging 2002, Security and Watermarking of Multimedia Contents V, Santa Clara, January 2003
S. Baudry, P. Nguyen, H. Maître, Estimation of geometric distortions in digital watermarking, in IEEE- ICIP 2002, Rochester, September 2002
D. Delannay, B. Macq, 2-D Periodic patterns for image watermarking, in Advanced Sciences and Technologies for Security Applications, vol. 1 (Springer, New York, 2005), pp. 297–18
M. Alghoniemy, A.H. Tewfik, Progressive quantized projection watermarking scheme, in Proceedings of the 7th ACM International Multimedia Conference, Orlando, FL (1999), pp. 295–298
J. Wang, G. Liu, Y. Dai, J. Sun, Z. Wang, S. Lian, Locally optimum detection for Barni’s multiplicative watermarking in DWT domain. Signal Process. 88 (1), 117–130 (2008)
W. Lu, H. Lu, F.-L. Chung, Feature based watermarking using watermark template match. Appl. Math. Comput. 177, 377–386 (2006). Elsevier
C. Serdean, M. Ambroze, M. Tomlinson, G. Wade, Dwt based video watermarking for copyright protection invariant to geometrical attacks, in International Symposium on Communication Systems, Networks and Digital Signal Processing, Staffordshire University, UK, 15–17 July 2002
F. Deguillaume, S. Voloshynovskiy, T. Pun, A method for the estimation and recovering from general affine transforms in digital watermarking applications, in SPIE Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, February 2002
J.J.K.O. Ruanaidh, T. Pun, Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Process. 66, 303–318 (1998)
B.-S. Kim, J.-G. Choi, K.-H. Park, RST-Resistant Image Watermarking Using Invariant Centroid and Reordered Fourier-Mellin Transform. Lecture Notes in Computer Science, vol. 2939 (Springer, New York, 2004), pp. 370–381
C.-Y. Lin, Public watermarking surviving general scaling and cropping: an application for print-and-scan process, in Multimedia and Security Workshop at ACM Multimedia 99, Orlando, FL, October 1999
H. Liu, M. Steinebach, Non-ubiquitous watermarking for image authentication by region of interest masking, in Proceedings of the Picture Coding Symposium, Portugal (2007)
K. Zebbiche, F. Khelifi, Region-based watermarking of biometric images: case study in fingerprint images. Int. J. Digital Multimed. Broadcast. 2008, 1–13 (2008)
X. Guo, T.-G. Zhuang, A region-based lossless watermarking scheme for enhancing security of medical data. J. Digit. Imaging 22 (1), 53–64 (2009). Springer
K. Raftopoulos, K. Ntalianis, P. Tzouveli, N. Tsapatsoulis, A. Parker-Wood, M. Ferecatu, Watermark resynchronization: an efficient approach based on Eulerian tours around a robust skeleton, in Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, 25–26 September 2013
C.Y. Lin, M. Wu, J.A. Bloom, I.J. Cox, M.L. Miller, Y.M. Lui, Rotation, scale, and translation resilient watermarking for images. IEEE Trans. Image Process. 10 (5), 767–82 (2001)
R.L. Ogniewicz, Discrete Voronoi Skeletons (Swiss Federal Institute of Technology, Zurich, 1992)
T. Sebastian, P. Klein, B. Kimia, Recognition of shapes by editing their Shock graphs. IEEE Pattern Anal. Mach. Intell. 26, 551–57 (2004)
J. Viega, Practical random number generation in software, in Proceedings of the 19th Annual Computer Security Applications Conference, December 2003
J.A. Sethian, A fast marching level set method for monotonically advancing fronts. Proc. Natl. Acad. Sci. 93 (4), 1591–1595 (1996)
J.A. Sethian, Level Set Methods and Fast Marching Methods, 2nd edn. (Cambridge University Press, Cambridge, 1999)
P. Kapsalas, S. Kollias, Affine morphological shape stable boundary regions (SSBR) for image representation, in Proceedings of International Conference on Image Processing (ICIP) 2011, Brussels, September 2011
T.B. Sebastian, P. Klein, B.B. Kimia, Recognition of shapes by editing Shock graphs. Proc. Int. Conf. Comput. Vis. 1, 755–762 (2001)
S.R. Deans, The Radon Transform and Some of Its Applications (Krieger Publishing Company, Malabar, 1983)
R.O. Duda, P.E. Hart, Use of the hough transformation to detect lines and curves in pictures. Commun. Assoc. Comput. Mach. 15 (1), 11–15 (1972)
V. Kolmogorov, R. Zabih, What energy functions can be minimized via graph cuts? IEEE Trans. Pattern Anal. Mach. Intell. 26 (2), 147–159 (2004)
M. Kass, A. Witkin, D. Terzopoulos, Snakes: active contour models. Int. J. Comput. Vis. 1 (4), 321–331 (1988). Springer
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Raftopoulos, K.A., Papadakis, N., Ntalianis, K.S., Tzouveli, P., Goudelis, G., Kollias, S.D. (2017). Region-Based Watermarking for Images. In: Daras, N., Rassias, T. (eds) Operations Research, Engineering, and Cyber Security. Springer Optimization and Its Applications, vol 113. Springer, Cham. https://doi.org/10.1007/978-3-319-51500-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-51500-7_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51498-7
Online ISBN: 978-3-319-51500-7
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)