Robust watermarking against print and scan attack through efficient modeling algorithm

This article proposes a blind discrete wavelet transform-discrete cosine transform (DWT-DCT) composite watermarking scheme that is robust against print and scan distortions. First, two-dimensional DWT is applied to the original image to obtain the mid-frequency subbands. Then, a one-dimensional DCT is applied to the selected mid-frequency subbands to extract the final coefficients for embedding the watermark. To specify watermarking parameters, we utilize a Genetic Algorithm to achieve a predefined image quality after watermark insertion. Suitable locations for watermarking are determined by analyzing the effect of a modeling algorithm. This model simulates noise and nonlinear attacks in printers and scanners through noise estimation and system identification methods. The experimental results demonstrate that the proposed algorithm has a high robustness against print and scan attack such that its robustness is higher than related watermarking algorithms. A neural network as a nonlinear system models print and scan distortions properly.An accurate model could suggest suitable locations in DWT domain for watermarking.Watermarking in the combination of DWT and DCT domains will improve the robustness.Only downsampling attack will degrade the robustness of watermarking algorithm.

[1]  Johan A. K. Suykens,et al.  Artificial Neural Networks for Modeling and Control of Non-Linear Systems , 1995 .

[2]  S. Han,et al.  A survey of digital image watermarking techniques , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[3]  Rafael C. González,et al.  Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[4]  B. S. Manjunath,et al.  Modeling the print-scan process for resilient data hiding , 2005, IS&T/SPIE Electronic Imaging.

[5]  Thierry Pun,et al.  Method for the estimation and recovering from general affine transforms in digital watermarking applications , 2002, IS&T/SPIE Electronic Imaging.

[6]  Tapio Seppänen,et al.  Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding , 2007, IWDW.

[7]  Gaurav Sharma,et al.  Continuous Phase-Modulated Halftones , 2009, IEEE Transactions on Image Processing.

[8]  Tapio Seppänen,et al.  Image watermarking with feature point based synchronization robust to print-scan attack , 2012, J. Vis. Commun. Image Represent..

[9]  David W. Coit,et al.  Multi-objective optimization using genetic algorithms: A tutorial , 2006, Reliab. Eng. Syst. Saf..

[10]  Xiamu Niu,et al.  Print-and-scan model and the watermarking countermeasure , 2005, Image Vis. Comput..

[11]  Yao Zhao,et al.  Image Watermarking Robust to Print and Generation Copy , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[12]  Vishal Monga,et al.  Orientation Modulation for Data Hiding in Clustered-Dot Halftone Prints , 2010, IEEE Transactions on Image Processing.

[13]  Kalyanmoy Deb,et al.  A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..

[14]  Qibin Sun,et al.  A practical print-scan resilient watermarking scheme , 2005, IEEE International Conference on Image Processing 2005.

[15]  B. S. Manjunath,et al.  `Print and Scan' Resilient Data Hiding in Images , 2006, IEEE Transactions on Information Forensics and Security.

[16]  Min-Jen Tsai,et al.  DCT and DWT-based image watermarking by using subsampling , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[17]  M. Jamzad,et al.  Computing watermark capacity in images according to their quad tree , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[18]  Mansour Jamzad,et al.  An Algorithm for Modeling Print and Scan Operations Used for Watermarking , 2008, IWDW.

[19]  Tapio Seppänen,et al.  Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method , 2006, IWDW.

[20]  Soo-Chang Pei,et al.  Paired Subimage Matching Watermarking Method on Ordered Dither Images and Its High-Quality Progressive Coding , 2008, IEEE Transactions on Multimedia.

[21]  Mohsen Ashourian,et al.  Digital watermarking of three-dimensional polygonal models in the spherical coordinate system , 2004 .

[22]  Wenjun Zeng,et al.  Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-Polar Mapping , 2010, IEEE Transactions on Information Forensics and Security.

[23]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[24]  Jiann-Der Lee,et al.  Oriented Modulation for Watermarking in Direct Binary Search Halftone Images , 2012, IEEE Transactions on Image Processing.

[25]  Tapio Seppänen,et al.  Image watermarking with a directed periodic pattern to embed multibit messages resilient to print-scan and compound attacks , 2010, J. Syst. Softw..

[26]  P. Greenwood,et al.  A Guide to Chi-Squared Testing , 1996 .

[27]  Chun-Shien Lu,et al.  Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .

[28]  Joachim M. Buhmann,et al.  Empirical evaluation of dissimilarity measures for color and texture , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[29]  Stefan M. Rüger,et al.  Evaluation of Texture Features for Content-Based Image Retrieval , 2004, CIVR.

[30]  Johan A. K. Suykens,et al.  Artificial neural networks for modelling and control of non-linear systems , 1995 .

[31]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..