Robust digital image watermarking method against geometrical attacks

被引:63
作者
Kim, BS
Choi, JG
Park, CH
Won, JU
Kwak, DM
Oh, SK
Koh, CR
Park, KH
机构
[1] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Buk Gu, Taegu 702701, South Korea
[2] Dong Eui Univ, Div Comp Applicat Engn, Busanjin Ku, Pusan 614714, South Korea
[3] Elect & Telecommun Res Inst, Postal Technol Res Ctr, Yuseong Gu, Taejon 305350, South Korea
[4] Kyungil Univ, Dept Elect & Informat Engn, Kyungsan Si 712701, Kyungsangpuk Do, South Korea
关键词
digital image watermarking; invariant centroid; geometrical attacks;
D O I
10.1016/S1077-2014(03)00020-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a new image watermarking scheme which is robust to RST attacks with cropping by improving Fourier-Mellin transform based watermarking (FMW). The proposed scheme reorders and modifies function blocks of FMW for improvement of realization and performance. Unlike FMW, our method uses log-polar map (LPM) in the spatial domain for scaling invariance, while translation invariance is provided by the use of an invariant centroid (IC) as the origin of LPM. IC is a gravity center of a central area on gray scale image that is invariant although an image is attacked by RST. For this, its calculation method is proposed. Also since LPM includes the property which transforms rotation of Cartesian coordinates system into a cyclic shift, 2-D DFT is performed on the LPM image and the magnitude spectrum extracted to provide a domain that is rotation invariant. The resulting domain, which is invariant to RST, is then used as the watermark-embedding domain. Furthermore, to prevent the watermarked image from degrading due to the coordinate system conversion, only LPM image of watermark signal is inverse mapped to Cartesian coordinates and add to the original image. Experimental results demonstrate that the proposed scheme is robust to RST attacks. (C) 2003 Elsevier Science Ltd. All rights reserved.
引用
收藏
页码:139 / 149
页数:11
相关论文
共 21 条
[1]  
Alghoniemy M, 2000, 2000 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, PROCEEDINGS VOLS I-III, P1291, DOI 10.1109/ICME.2000.871003
[2]   Improved wavelet-based watermarking through pixel-wise masking [J].
Barni, M ;
Bartolini, F ;
Piva, A .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (05) :783-791
[3]   A DCT-domain system for robust image watermarking [J].
Barni, M ;
Bartolini, F ;
Cappellini, V ;
Piva, A .
SIGNAL PROCESSING, 1998, 66 (03) :357-372
[4]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[5]  
Bors AG, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P231, DOI 10.1109/ICIP.1996.560426
[6]   Copyright labeling of digitized image data [J].
Burgett, S ;
Koch, E ;
Zhao, J .
IEEE COMMUNICATIONS MAGAZINE, 1998, 36 (03) :94-100
[7]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[8]  
HANGQIANG C, 2000, P SIGNAL PROCESSING, V1, P99
[9]   Hidden digital watermarks in images [J].
Hsu, CT ;
Wu, JL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) :58-68
[10]   Wavelet based watermarking method for digital images using the human visual system [J].
Kim, YS ;
Kwon, OH ;
Park, RH .
ELECTRONICS LETTERS, 1999, 35 (06) :466-468