JSNet: A simulation network of JPEG lossy compression and restoration for robust image watermarking against JPEG attack

Abstract Deep learning-based watermarking methods have achieved a better performance in capacity and invisibility than some traditional methods. However, their robustness against JPEG lossy compression attack is still to be improved. To enhance the robustness and construct an end-to-end method, it is urgent to simulate the JPEG lossy compression by a neural network and then introduce it into the deep learning-based watermarking methods. In this paper, a JPEG simulation network JSNet is proposed to reappear the whole procedure of the JPEG lossy compression and restoration except entropy encoding as realistically as possible. The steps of sampling, DCT, and quantization are modeled by the max-pooling layer, convolution layer, and 3D noise-mask, respectively. The proposed JSNet can simulate JPEG lossy compression with any quality factors. To verify the proposed JSNet in improving the robustness against JPEG compression attack, a CNN-based robust watermarking network (CRWNet) is proposed as an application example. The end-to-end CRWNet contains three subnetworks, i.e., embedding subnetwork, JSNet, and extraction subnetwork. Here. the JSNet is regarded as an attack module in the pipeline. Experimental results on two publicly available datasets (ImageNet, BossBase) demonstrate that: (a) the proposed JSNet can well simulate JPEG lossy compression under any quality factors with small Root mean square error (RMSE) values; (b) the proposed CRWNet considering JSNet has achieved an average 30.6 percent advantage over the basic model without consideration of JSNet.

[1]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[2]  Stefan Winkler,et al.  A vision-based masking model for spread-spectrum image watermarking , 2002, IEEE Trans. Image Process..

[3]  Ruimin Shen,et al.  Color image watermarking scheme based on linear discriminant analysis , 2008, Comput. Stand. Interfaces.

[4]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1992 .

[5]  Ippei HAMAMOTO,et al.  Neural Watermarking Method Including an Attack Simulator against Rotation and Compression Attacks , 2020, IEICE Trans. Inf. Syst..

[6]  Gernot Kubin,et al.  Speaker identification security improvement by means of speech watermarking , 2007, Pattern Recognit..

[7]  Gorthi R. K. Sai Subrahmanyam,et al.  Exploring the learning capabilities of convolutional neural networks for robust image watermarking , 2017, Comput. Secur..

[8]  Jiaxin Wang,et al.  High-Capacity Robust Image Steganography via Adversarial Network , 2020, KSII Trans. Internet Inf. Syst..

[9]  A. Kumaravel,et al.  Improved image compression using effective lossless compression technique , 2018, Cluster Computing.

[10]  Heung-Kyu Lee,et al.  Finding robust domain from attacks: A learning framework for blind watermarking , 2017, Neurocomputing.

[11]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[12]  Yuhui Zheng,et al.  Quaternion discrete fractional random transform for color image adaptive watermarking , 2017, Multimedia Tools and Applications.

[13]  Ling-Yu Duan,et al.  DeepShoe: An improved Multi-Task View-invariant CNN for street-to-shop shoe retrieval , 2019, Comput. Vis. Image Underst..

[14]  Bingyang Wen,et al.  ROMark: A Robust Watermarking System Using Adversarial Training , 2019, ArXiv.