Camera-Shooting Resilient Watermarking on Image Instance Level

被引:1
作者
He, Mingjin [1 ]
Feng, Bingwen [1 ]
Guo, Yizhi [1 ]
Weng, Jian [1 ]
Lu, Wei [2 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[2] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangdong Prov Key Lab Informat Secur Technol, Minist Educ,Key Lab Machine Intelligence & Adv Co, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Robust watermarking; camera-shooting attack; image instance; template; resynchronization; ROBUSTNESS; FRAMEWORK;
D O I
10.1109/TCSVT.2024.3411816
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Capturing displayed images using portable cameras has become familiar among multimedia pirates, necessitating the urgent requirement of camera-shooting resilient watermarking schemes. In this paper, we consider the stealers who only record parts of images, and propose a robust watermarking scheme at the image instance level. This scheme consists of an encoding end, a noise layer, and a decoding end. The encoding end first selects specific watermarking regions associated with segmented image instances. Afterwards, an encoder is employed to embed watermark sequences into the RGB color model of these watermarking regions. At last, templates are embedded to product the final watermarked images. Specifically, our suggested template-based resynchronization comprises a template embedding module at the encoding end and a geometric correction module at the decoding end. The former embeds templates by a correlation-aware multiplicative spread spectrum with an adaptive amplitude, while the latter learns a calibrator to estimate the perspective projection. Experiments on both simulation and real-world scenarios support that the proposed scheme effectively resists camera-shooting attacks with various shooting conditions, regardless of whether the entire displayed images have been captured.
引用
收藏
页码:10874 / 10887
页数:14
相关论文
共 41 条
  • [21] Fang H., Et al., TERA: Screen-to-Camera image code with transparency, efficiency, robustness and adaptability, IEEE Trans. Multimedia, 24, pp. 955-967, (2022)
  • [22] Zhu J., Kaplan R., Johnson J., Fei-Fei L., Hidden: Hiding data with deep networks, Proc. Eur. Conf. Comput. Vis. (ECCV), pp. 657-672, (2018)
  • [23] Jia Z., Fang H., Zhang W., MBRS: Enhancing robustness of DNN-based watermarking by mini-batch of real and simulated JPEG compression, Proc. 29th ACM Int. Conf. Multimedia, pp. 41-49, (2021)
  • [24] Chen B., Wu Y., Coatrieux G., Chen X., Zheng Y., JSNet: A simulation network of JPEG lossy compression and restoration for robust image watermarking against JPEG attack, Comput. Vis. Image Understand, 197-198, (2020)
  • [25] Wang B., Wu Y., Wang G., Adaptor: Improving the robustness and imperceptibility of watermarking by the adaptive strength factor, IEEE Trans. Circuits Syst. Video Technol, 33, 11, pp. 6260-6272, (2023)
  • [26] Shin R., Song D., JPEG-resistant adversarial images, Proc. Workshop Mach. Learn. Comput. Secur, 1, (2017)
  • [27] Zhang C., Karjauv A., Benz P., Kweon I.S., Towards robust deep hiding under non-differentiable distortions for practical blind watermarking, Proc. 29th ACM Int. Conf. Multimedia, pp. 5158-5166, (2021)
  • [28] Jia J., Gao Z., Zhu D., Min X., Zhai G., Yang X., Learning invisible markers for hidden codes in offline-to-online photography, Proc. IEEE/CVF Conf. Comput. Vis. Pattern Recognit, pp. 2273-2282, (2022)
  • [29] He K., Gkioxari G., Dollar P., Girshick R., Mask R-CNN, Proc. IEEE Int. Conf. Comput. Vis. (ICCV), pp. 2961-2969, (2017)
  • [30] Ren S., He K., Girshick R., Sun J., Faster R-CNN: Towards realtime object detection with region proposal networks, Proc. Adv. Neural Inf. Process. Syst, 28, pp. 1-11, (2015)