Robust Histogram Shape-Based Method for Image Watermarking

Cropping and random bending are two common attacks in image watermarking. In this paper we propose a novel image-watermarking method to deal with these attacks, as well as other common attacks. In the embedding process, we first preprocess the host image by a Gaussian low-pass filter. Then, a secret key is used to randomly select a number of gray levels and the histogram of the filtered image with respect to these selected gray levels is constructed. After that, a histogram-shape-related index is introduced to choose the pixel groups with the highest number of pixels and a safe band is built between the chosen and nonchosen pixel groups. A watermark-embedding scheme is proposed to insert watermarks into the chosen pixel groups. The usage of the histogram-shape-related index and safe band results in good robustness. Moreover, a novel high-frequency component modification mechanism is also utilized in the embedding scheme to further improve robustness. At the decoding end, based on the available secret key, the watermarked pixel groups are identified and watermarks are extracted from them. The effectiveness of the proposed image-watermarking method is demonstrated by simulation examples.

[1]  Rabab Kreidieh Ward,et al.  Robust Image Watermarking Based on Multiscale Gradient Direction Quantization , 2011, IEEE Transactions on Information Forensics and Security.

[2]  Thierry Pun,et al.  An iterative template matching algorithm using the Chirp-Z transform for digital image watermarking , 2000, Pattern Recognit..

[3]  Sung-Jea Ko,et al.  A New Histogram Modification Based Reversible Data Hiding Algorithm Considering the Human Visual System , 2011, IEEE Signal Processing Letters.

[4]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[5]  Fernando Pérez-González,et al.  Analysis of pilot-based synchronization algorithms for watermarking of still images , 2002, Signal Process. Image Commun..

[6]  Yau-Hwang Kuo,et al.  On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking , 2011, IEEE Transactions on Image Processing.

[7]  C.-C. Jay Kuo,et al.  An improved DC recovery method from AC coefficients of DCT-transformed images , 2010, 2010 IEEE International Conference on Image Processing.

[8]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[9]  Ahmed H. Tewfik,et al.  Geometric Invariance in image watermarking , 2004, IEEE Transactions on Image Processing.

[10]  Jean-Luc Dugelay,et al.  Still-image watermarking robust to local geometric distortions , 2006, IEEE Transactions on Image Processing.

[11]  Yue Zhang,et al.  Affine Legendre Moment Invariants for Image Watermarking Robust to Geometric Distortions , 2011, IEEE Transactions on Image Processing.

[12]  Chun-Shien Lu,et al.  Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection , 2006, IEEE Transactions on Multimedia.

[13]  Mauro Barni,et al.  Effectiveness of exhaustive search and template matching against watermark desynchronization , 2005, IEEE Signal Processing Letters.

[14]  Thierry Pun,et al.  Robust template matching for affine resistant image watermarks , 2000, IEEE Trans. Image Process..

[15]  Yan Lin,et al.  A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression , 2003, IEEE Trans. Circuits Syst. Video Technol..

[16]  Wenjun Zeng,et al.  Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver , 2008, IEEE Transactions on Multimedia.

[17]  Iwan Setyawan,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000 .

[18]  Heung-Kyu Lee,et al.  Digital Cinema Watermarking for Estimating the Position of the Pirate , 2010, IEEE Transactions on Multimedia.

[19]  Pingzhi Fan,et al.  Copyright Protection for E-Government Document Images , 2012, IEEE MultiMedia.

[20]  Xin-Wei Li,et al.  A New Histogram Based Image Watermarking Scheme Resisting Geometric Attacks , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[21]  Jiwu Huang,et al.  Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[22]  V. Saxena,et al.  Towards Increasing the Robustness of Image Watermarking Scheme Against Histogram Equalization Attack , 2007, 2007 IEEE 15th Signal Processing and Communications Applications.

[23]  Yau-Hwang Kuo,et al.  A Feature-Based Digital Image Watermarking for Copyright Protection and Content Authentication , 2007, 2007 IEEE International Conference on Image Processing.

[24]  Ramiro Jordan,et al.  Geometric attacks on image watermarking systems , 2005, IEEE MultiMedia.

[25]  Pengfei Zhu,et al.  On Critical Point Detection of Digital Shapes , 1995, IEEE Trans. Pattern Anal. Mach. Intell..

[26]  Seyed Mohammad Ahadi,et al.  A Robust Image Watermarking in the Ridgelet Domain Using Universally Optimum Decoder , 2010, IEEE Transactions on Circuits and Systems for Video Technology.

[27]  Chang Dong Yoo,et al.  Image watermarking based on invariant regions of scale-space representation , 2006, IEEE Transactions on Signal Processing.

[28]  Nikolas P. Galatsanos,et al.  Geometric robust watermarking based on a new mesh model correction approach , 2002, Proceedings. International Conference on Image Processing.

[29]  Gabriela Csurka,et al.  Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[30]  K. Mardia,et al.  A review of image-warping methods , 1998 .

[31]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[32]  Sushil Jajodia,et al.  Recovery of Watermarks from Distorted Images , 1999, Information Hiding.

[33]  Xuelong Li,et al.  Local histogram based geometric invariant image watermarking , 2010, Signal Process..

[34]  Michel Barlaud,et al.  Compensation of geometrical deformations for watermark extraction in digital cinema application , 2001, IS&T/SPIE Electronic Imaging.

[35]  Franck Davoine Triangular meshes: A solution to resist to geometric distortions based watermark-removal softwares , 2000, 2000 10th European Signal Processing Conference.

[36]  Ingemar J. Cox,et al.  Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..

[37]  Fernando Pérez-González,et al.  The effect of the random jitter attack on the bit error rate performance of spatial domain image watermarking , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[38]  Jihah Nah,et al.  Digital Watermarking Robust to Geometric Distortions , 2012 .

[39]  Iwan Setyawan,et al.  Exhaustive geometrical search and the false positive watermark detection probability , 2003, IS&T/SPIE Electronic Imaging.

[40]  Xuelong Li,et al.  Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[41]  Michael Unser,et al.  Image interpolation and resampling , 2000 .

[42]  Wanlei Zhou,et al.  A Dual-Channel Time-Spread Echo Method for Audio Watermarking , 2012, IEEE Transactions on Information Forensics and Security.

[43]  Yu-Tzu Lin,et al.  Rotation, scaling, and translation resilient watermarking for images , 2011 .

[44]  Hefei Ling,et al.  Real-Time Compressed- Domain Video Watermarking Resistance to Geometric Distortions , 2012, IEEE MultiMedia.

[45]  Nora Cuppens-Boulahia,et al.  Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting , 2013, IEEE Transactions on Information Forensics and Security.

[46]  Wenjun Zeng,et al.  Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-Polar Mapping , 2010, IEEE Transactions on Information Forensics and Security.

[47]  Wanlei Zhou,et al.  Effective Pseudonoise Sequence and Decoding Function for Imperceptibility and Robustness Enhancement in Time-Spread Echo-Based Audio Watermarking , 2011, IEEE Transactions on Multimedia.