Watermarking through image geometry change tracking

Abstract Most of the digital image watermarking techniques are susceptible to geometric attacks such as cropping, rotation and scaling. These attacks are the easiest yet most successful in rendering the survival of watermark difficult. Such geometric operations alter the pixel orientation in the cover thereby rendering the watermark difficult to locate and extract. However, if the alterations produced by the geometric attacks such as scaling, cropping and rotation can be modeled in terms of the change in the image geometry, it is possible to relocate the watermark even after the original cover has suffered an attack. This paper contributes to the state of the art by proposing an image watermarking technique that attempts to model the attacks like cropping, scaling and rotation in terms of the image geometry. The proposed scheme is acceptably resistant to common geometric attacks and common image processing attacks. The watermark embedding is also done efficiently to offer resistance to image processing attacks. The watermark detection procedure is blind and key based, also not requiring the original cover work for watermark extraction. Efforts have been given to ensure that the proposed scheme conforms to robustness against attacks and exhibits high visual fidelity of the watermarked cover.

[1]  Jiwu Huang,et al.  A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform , 2006, IWDW.

[2]  Jianting Guo,et al.  Secure watermarking scheme against watermark attacks in the encrypted domain , 2015, J. Vis. Commun. Image Represent..

[3]  Iwan Setyawan,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000 .

[4]  Chun-Shien Lu,et al.  Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .

[5]  Suvamoy Changder,et al.  Cropping and Rotation Invariant Watermarking Scheme in the Spatial Domain , 2014 .

[6]  Suvamoy Changder,et al.  Chaos based Edge Adaptive Image Steganography , 2013 .

[7]  Shijun Xiang,et al.  Geometrically Invariant Image Watermarking in the DWT Domain , 2007, WISA.

[8]  Juergen Seitz,et al.  Digital Watermarking for Digital Media , 2005 .

[9]  Mauro Barni,et al.  Managing Copyright in Open Networks , 2002, IEEE Internet Comput..

[10]  Xiaolong Li,et al.  Efficient Generalized Integer Transform for Reversible Watermarking , 2010, IEEE Signal Processing Letters.

[11]  Sviatoslav Voloshynovskiy,et al.  Watermark template attack , 2001, IS&T/SPIE Electronic Imaging.

[12]  H. B. Griffiths A contribution to the theory of manifolds. , 1953 .

[13]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[14]  Yan Lin,et al.  A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression , 2003, IEEE Trans. Circuits Syst. Video Technol..

[15]  Damon M. Chandler,et al.  Main subject detection via adaptive feature refinement , 2011, J. Electronic Imaging.

[16]  Ramiro Jordan,et al.  Geometric attacks on image watermarking systems , 2005, IEEE MultiMedia.