A method for hiding synchronization marks in scale and rotation resilient watermarking schemes

被引:10
作者
Delannay, D [1 ]
Macq, B [1 ]
机构
[1] Catholic Univ Louvain, Commun & Remote Sensing Lab, B-1348 Louvain, Belgium
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV | 2002年 / 4675卷
关键词
watermarking; synchronization; secret partition;
D O I
10.1117/12.465314
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As concern about watermark robustness growns, different approaches based on the introduction of synchronization marks have been presented to survive geometrical attacks. Most of the proposed techniques rely either on the introduction of a dedicated template either on the detection of particular properties in the autocorrelation function (ACF) of the watermark itself in order to resist against scaling and rotation transformations. The use of this side-information at the detector makes an inversion of the transformation possible. However, due to the publicness of this side-information, those techniques turn out to be very vulnerable to a removal attack. We propose an innovative method to hide the synchronization marks and therefore prevent malicious removal attacks (eg. template attack,...). The ability to detect the synchronization marks will be conditionned by the knowledge of a secret key. The technique consists in using an image dependent secret binary mask to modulate the synchronization pattern before it is introduced in the image. The ability to recover this binary mask upon rotation and scaling allows the detection of the synchronization marks even after transformation. Although mask recovering presents a considerable error rate, sufficient detection of the synchronization marks can be achieved. The mask, obtained from a signal-dependent partition, leads to a spectral spreading of the synchronisation mark, making template attacks nearly impossible to perform.
引用
收藏
页码:548 / 554
页数:7
相关论文
共 11 条
[1]  
[Anonymous], P INT C IM PROC THES
[2]   A geometrical and frequential watermarking scheme using similarities [J].
Bas, P ;
Chassery, JM ;
Davoine, F .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :264-272
[3]   Robust watermarking based on the warping of pre-defined triangular patterns [J].
Bas, P ;
Chassery, JM ;
Macq, B .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :99-109
[4]   Generalized 2-D cyclic patterns for secret watermark generation [J].
Delannay, D ;
Macq, B .
2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, 2000, :77-79
[5]  
HERRIGEL A, 2001, IS T SPIES 13 ANN S, V3
[6]  
KUTTER M, 2000, IS T SPIES 12 ANN S, V3971, pR2
[7]  
ORuanaidh JJK, 1997, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL I, P536, DOI 10.1109/ICIP.1997.647968
[8]  
PHOT PROD METH EMPL, Patent No. 5822436
[9]  
PIVA A, 1999, GMD REPORT 85, P65
[10]   Splines - A perfect fit for signal and image processing [J].
Unser, M .
IEEE SIGNAL PROCESSING MAGAZINE, 1999, 16 (06) :22-38