Improved SIFT Feature-Based Watermarking Method for IHC Ver. 5

The current scale-invariant feature transform (SIFT) feature-based watermarking method proposed by Kawamura and Uchida was evaluated using Information Hiding Criteria (IHC) ver. 5. The marked regions were selected around the SIFT feature points then normalized to a uniform size against scaling attack, and watermarks were embedded into these normalized regions. There are two problems with this method. One is that the marked regions are distorted by normalization. The other is that the feature points are not detectable due to embedding on the points. Therefore, we propose an improved version of this method to solve these problems. We introduce two improvements called as a gradual magnification factor for normalization and concentric square regions for marked regions. The proposed method was evaluated using IHC ver. 5, and the feature detection rate improved and the bit error rate decreased.

[1]  Asifullah Khan,et al.  BCH coding and intelligent watermark embedding: Employing both frequency and strength selection , 2010, Appl. Soft Comput..

[2]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[3]  Evangelos Eleftheriou,et al.  Regular and irregular progressive edge-growth tanner graphs , 2005, IEEE Transactions on Information Theory.

[4]  Adrien Bartoli,et al.  Fast Explicit Diffusion for Accelerated Features in Nonlinear Scale Spaces , 2013, BMVC.

[5]  Hefei Ling,et al.  Robust localized image watermarking based on invariant regions , 2012, Digit. Signal Process..

[6]  Tapio Seppänen,et al.  Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding , 2007, IWDW.

[7]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[8]  Tadashi Wadayama,et al.  A Coded Modulation Scheme Based on Low Density Parity Check Codes , 2001 .

[9]  Masaki Kawamura,et al.  SIFT Feature-Based Watermarking Method Aimed at Achieving IHC Ver.5 , 2017, IIH-MSP.

[10]  Masaki Kawamura,et al.  Watermarking Method Using Concatenated Code for Scaling and Rotation Attacks , 2015, IWDW.

[11]  Robert G. Gallager,et al.  Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.

[12]  Adrien Bartoli,et al.  KAZE Features , 2012, ECCV.

[13]  Yan Lin,et al.  A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression , 2003, IEEE Trans. Circuits Syst. Video Technol..

[14]  Thierry Pun,et al.  Robust template matching for affine resistant image watermarks , 2000, IEEE Trans. Image Process..

[15]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[16]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[17]  Takayuki Nozaki,et al.  Image Watermarking Method Satisfying IHC by Using PEG LDPC Code , 2017, IEICE Trans. Inf. Syst..

[18]  Takahiro Yamamoto,et al.  Method of Spread Spectrum Watermarking Using Quantization Index Modulation for Cropped Images , 2015, IEICE Trans. Inf. Syst..