Application of rank metric codes in digital image watermarking

Abstract In this paper, we propose a new digital image watermarking algorithm where the resistance against attacks is studied using error correcting codes. Using the well known Lattice QIM in the spatial domain, we propose to use a different kind of error correcting codes called rank metric codes. These codes are already well used in cryptography and communications for network coding but not used yet in the context of watermarking. In this article, we show how this metric permits to correct errors with a specific structure and is adapted to specific image attacks when combined with a watermarking technique. In particular, we describe a rank metric code family called Gabidulin codes analogous to the well known Reed–Solomon codes. If one considers a rank code over a finite field extension, then any codeword has a matrix representation. One can decode the original message if the matrix rank of the detected codeword is small enough. We propose a study to validate the concept of rank metric in watermarking applications. First, we introduce a theoretically invariant method to luminance additive constant change. After combining the Lattice QIM method and rank metric codes, we add a multi-detection strategy on the damaged images with controlled luminance distortions. Then, using a block-based watermarking approach, we show how the proposed association can also be robust to an image distortion we called content erasure or copy-paste. The proposed approach completes other watermarking strategies against attacks with random errors such as JPEG compression.

[1]  Ernst M. Gabidulin A Fast Matrix Decoding Algorithm for Rank-Error-Correcting Codes , 1991, Algebraic Coding.

[2]  Gilles Zémor,et al.  New Results for Rank-Based Cryptography , 2014, AFRICACRYPT.

[3]  Martin Kutter,et al.  Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.

[4]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[5]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[6]  Ingemar J. Cox,et al.  A Review of of Watermarking Principles and Practices , 1999 .

[7]  Kamaruddin Malik Mohamad,et al.  Anti-cropping digital image watermarking using Sudoku , 2013, Int. J. Grid Util. Comput..

[8]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[9]  Wadood Abdul,et al.  Error correcting codes for robust color wavelet watermarking , 2013, EURASIP J. Inf. Secur..

[10]  Alireza Naghsh,et al.  Introducing a new method robust against crop attack in digital image watermarking using two-step sudoku , 2017, 2017 3rd International Conference on Pattern Recognition and Image Analysis (IPRIA).

[11]  Pierre Loidreau,et al.  A Welch-Berlekamp Like Algorithm for Decoding Gabidulin Codes , 2005, WCC.

[12]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[13]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[14]  Philippe Delsarte,et al.  Bilinear Forms over a Finite Field, with Applications to Coding Theory , 1978, J. Comb. Theory A.

[15]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[16]  Frank R. Kschischang,et al.  On Metrics for Error Correction in Network Coding , 2008, IEEE Transactions on Information Theory.

[17]  Bertram Felgenhauer,et al.  Mathematics of Sudoku I , 2006 .

[18]  Philippe Carré,et al.  Watermarking and Rank Metric Codes , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).