A novel image watermarking scheme based on amplitude attack

This paper presents a novel image watermark scheme based on the characteristics of amplitude attacks. First of all, the analysis of amplitude attacks is performed. Then the amplitude attacks are categorized into three types: positive attack, negative attack and random attack. Finally, based on these attack types, we design three corresponding detectors. The detectors remove the unreliable discrete cosine transform (DCT) coefficients in the attacked image so that only reliable coefficients are used for the extraction of the watermark embedded. The experimental results indicate that the proposed technique improves robustness significantly without sacrificing the false alarm rate.

[1]  Ahmed H. Tewfik,et al.  Geometric Invariance in image watermarking , 2004, IEEE Transactions on Image Processing.

[2]  Chin-Hsing Chen,et al.  A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection , 2005, Pattern Recognit..

[3]  Ioannis Pitas,et al.  Copyright protection of images using robust digital signatures , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[4]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[5]  Hsueh-Ming Hang,et al.  A feature-based robust digital image watermarking scheme , 2003, IEEE Trans. Signal Process..

[6]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[7]  Ja-Ling Wu,et al.  Multiresolution watermarking for digital images , 1998 .

[8]  Benoit M. Macq,et al.  Geometrically invariant watermarking using feature points , 2002, IEEE Trans. Image Process..

[9]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[10]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[11]  Shih-Kun Huang,et al.  Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..

[12]  Dwight D. Day,et al.  Applications of the naturalness preserving transform to image watermarking and data hiding , 2004, Digit. Signal Process..

[13]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[14]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[15]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[16]  Yuan-Pei Lin,et al.  Wavelet tree quantization for copyright protection watermarking , 2004, IEEE Transactions on Image Processing.

[17]  Frank Y. Shih,et al.  Combinational image watermarking in the spatial and frequency domains , 2003, Pattern Recognit..

[18]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.