Recaptured attack-resilient watermarking scheme

被引:3
作者
Mehta, Preeti [1 ]
Singh, Mahesh K. [1 ]
Singha, Nitin [1 ]
机构
[1] Natl Inst Technol Delhi, New Delhi, India
关键词
recapture attack; singular value decomposition; double-density dual-tree discrete wavelet transform; security; blind watermarking; IMAGE WATERMARKING; ROBUST;
D O I
10.1117/1.JEI.31.4.043043
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a recaptured attack-resilient blind watermarking scheme. The work aims to recover the watermark information from the stego (watermarked image) reacquired through a digital liquid-crystal display monitor. In the age of digital globalization, problems like copyright and integrity infringement of digital content are growing exponentially. The content owner can prove their ownership by extracting the embedded watermark from the digitally breached data. The presented framework is robust to several geometrical and signal processing attacks, including lens distortions, intensity distortion, and moire distortion caused by recapture attack. The singular values of a watermark image and a unique security key are embedded in the host image's double-density dual-tree discrete wavelet transform (DDD-DWT) coefficients. However, most singular value decomposition (SVD) based watermarking algorithms are prone to false alarm rates and missed alarm rates, causing a security issue. On that account, the proposed watermarking scheme in this paper introduces a unique security key embedding for authentication at the decoder side. The experimental results show that the proposed framework provides high perceptibility with a WPSNR value > 59 dB and robustness against various attacks and security.
引用
收藏
页数:16
相关论文
共 50 条
[41]   PCA-DTT 2D-DHCES based attack resilient imperceptible image watermarking [J].
Ahmed Khan .
Multimedia Tools and Applications, 2021, 80 :7515-7527
[42]   SSVS-SSVD Based Desynchronization Attacks Resilient Watermarking Method for Stereo Signals [J].
Zhao, Juan ;
Zong, Tianrui ;
Xiang, Yong ;
Gao, Longxiang ;
Hua, Guang ;
Sood, Keshav ;
Zhang, Yushu .
IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2023, 31 :448-461
[43]   A screen-shooting resilient document image watermarking scheme using deep neural network [J].
Ge, Sulong ;
Fei, Jianwei ;
Xia, Zhihua ;
Tong, Yao ;
Weng, Jian ;
Liu, Jianan .
IET IMAGE PROCESSING, 2023, 17 (02) :323-336
[44]   Collusion Attack Resistant SVD based Secured Audio Watermarking Scheme with Chaotic Encryption [J].
Tewari, Tribhuwan Kumar ;
Saxena, Vikas .
2018 ELEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2018, :304-308
[45]   Blind image watermarking scheme based on wavelet tree quantization robust to geometric attack [J].
Li, Enping ;
Liang, Huaqing ;
Niu, Xinxin .
WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, :712-712
[46]   Collusion attack-resistant watermarking scheme using correlation peak position modulation [J].
Nah, Jihah ;
Kim, Jongweon .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (22) :14917-14926
[47]   Collusion attack-resistant watermarking scheme using correlation peak position modulation [J].
Jihah Nah ;
Jongweon Kim .
Multimedia Tools and Applications, 2016, 75 :14917-14926
[48]   A Robust Watermarking Scheme for Copyright Protection [J].
Singh, Satendra Pal ;
Bhatnagar, Gaurav .
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2018, VOL 2, 2020, 1024 :431-443
[49]   Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channels [J].
Zong, Tianrui ;
Zhao, Juan ;
Xiang, Yong ;
Natgunanathan, Iynkaran ;
Gao, Longxiang ;
Zhou, Wanlei .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2022, 25 (01) :357-379
[50]   Practical Watermarking Method Estimating Watermarked Region from Recaptured Videos on Smartphone [J].
Iwata, Motoi ;
Mizushima, Naoyoshi ;
Kise, Koichi .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (01) :24-32