Abstract
In this article, we review the algorithms for rotation, scaling and translation (RST) invariant image watermarking. There are mainly two categories of RST invariant image watermarking algorithms. One is to rectify the RST transformed image before conducting watermark detection. Another is to embed and detect watermark in an RST invariant or semi-invariant domain. In order to help readers understand, we first introduce the fundamental theories and techniques used in the existing RST invariant image watermarking algorithms. Then, we discuss in detail the work principles, embedding process, and detection process of the typical RST invariant image watermarking algorithms. Finally, we analyze and evaluate these typical algorithms through implementation, and point out their advantages and disadvantages.
- Abdel-Aziz, B., Zhao, J., and Chouinard, J.-Y. 2004. On the limits of second generation watermarks. In Proceedings of the IEEE Canadian Conference on Computer and Robot Vision (CRV2004). IEEE Computer Society Press, Los Alamitos, CA, 209--216. Google ScholarDigital Library
- Abu-Mostafa, Y. and Psaltis, D. 1984. Recognitive aspects of moment invariants. IEEE Trans. Patt. Anal. Mach. Intell. PAMI-6 6, 698--706.Google ScholarDigital Library
- Alghoniemy, M. and Tewfik, A. H. 2000a. Geometric distortion correction in image watermarking. In Proceedings of SPIE: Security and Watermarking of Multimedia Contents. Vol. 3971. 82--89.Google ScholarCross Ref
- Alghoniemy, M. and Tewfik, A. H. 2000b. Image watermarking by moment invariants. In Proceedings of IEEE International Conference on Image Processing. Vol. 2. 73--76.Google Scholar
- Alghoniemy, M. and Tewfik, A. H. 2004. Geometric invariance in image watermarking. IEEE Trans. Image Proc. 13, 2, 145--153. Google ScholarDigital Library
- Alvarez-Rodriguez, M. and Perez-Gonzalez, F. 2002. Analysis of pilot-based synchronization algorithms for watermarking of still images. Signal Processing: Image Communication 17, 8 (Sept.), 611--633.Google ScholarCross Ref
- Barni, M. 2005. Effectiveness of exhaustive search and template matching against watermark desynchronization. IEEE Signal Processing Letters 12, 2 (Feb.), 158--161.Google ScholarCross Ref
- Bartolini, F., Barni, M., Cappellini, V., and Piva, A. 1998. Mask building for perceptually hiding frequency embedded watermarks. In Proceedings of the 5th IEEE International Conference on Image Processing (ICIP'98). IEEE Computer Society Press, Los Alamitos, CA, Vol. 1. 450--454.Google Scholar
- Bas, P., Chassery, J., and Macq, B. 2002. Geometrically invariant watermarking using feature points. IEEE Trans. Image Proc. 11, 9, 1014--1028. Google ScholarDigital Library
- Bas, P., Chassery, J., and Macq, B. 2000. Robust watermarking based on the warping pre-defined triangular patterns. In Proceedings of SPIE 2000. (Jan.), 99--109.Google Scholar
- Bors, A. and Pitas, I. 1996. Image watermarking using DCT domian constraints. In Proceedings of IEEE International Conference on Image Processing. Vol. 2. IEEE Computer Society Press, Los Alamitos, CA, 231--234.Google Scholar
- Bracewell, R. 2000. The Fourier transform and its applications. McGraw Hill, Boston, MA, ISBN: 0073039381.Google Scholar
- Bruyndonckx, O., Quisquater, J. J., and Macq, B. 1995. Spatial method for copyright labeling of digital images. In Proceedings of the IEEE Workshop Nonlinear Signal and Image Processing. IEEE Computer Society Press, Los Alamitos, CA, 456--459.Google Scholar
- Brown, L. G. 1992. A survey of image registration techniques. ACM Computing Surveys 24, 4, 325--376. Google ScholarDigital Library
- Caldelli, R., Barni, M., and Piva, A. 2000. Geometric-invariant robust watermarking through constellation matching in the frequency domain. In Proceedings of the IEEE International Conference on Image Processing. Vol. 2. IEEE Computer Society Press, Los Alamitos, CA, 65--68.Google Scholar
- Chandran, V., Carswell, B., Boashash, B., and Elgar, S. L. 1997. Pattern recognition using invariants defined from higher order spectra: 2-D image inputs. IEEE Trans. Image Process. 6, 5, 703--712. Google ScholarDigital Library
- Chandran, V. and Elgar, S. L. 1993. Pattern recognition using invariants defined from higher order spectra-one-dimensional inputs. IEEE Trans. Signal Process. 41, 1, 205--213.Google ScholarDigital Library
- Checkmark. http://www.checkmark.com/.Google Scholar
- Cox, I., Kilian, J., Leighton, T., and Shamoon, T. 1996. Secure spread spectrum watermarking for images, audio and video. In Proceedings of the IEEE International Conference on Image Processing (ICIP-96). IEEE Computer Society Press, Los Alamitos, CA, 243--246.Google Scholar
- Cox, I., Kilian, J., Leighton, T., and Shamoon, T. 1997. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 12, 1673--1687. Google ScholarDigital Library
- Cox, I., Miller, M., and Bloom, J. 2002. Digital watermarking. Morgan-Kaufmann, San Francisco, CA, ISBN: 1-55860-714-5. Google ScholarDigital Library
- Csurka, G., Deguillaume, F., O'Ruanaidh, J. J. K., and Pun, T. 1999. A Bayesian approach to affine transformation resistant image and video watermarking. In Proceedings of the International Workshop on Information Hiding. Vol. 2. 315--330. Google ScholarDigital Library
- Dai, X. and Khorram, S. 1999. A feature-based image registration algorithm using improved chain-code representation combined with invariant moments. IEEE Transactions on Geoscience and Remote Sensing 37, 5, 2351--2362.Google ScholarCross Ref
- Deguillaume, F., Csurka, G., O'Ruanaidh, J. J. K., and Pun, T. 1999. Robust 3D DFT video watermarking. In Proceedings of IS&T/SPIE Electronic Imaging 99, 113--124.Google Scholar
- Depovere, G., Kalker, T., and Linnartz, J. 1998. Improved watermark detection using filtering before correlation. In Proceedings of the IEEE International Conference on Image Processing (ICIP). Vol. 1. IEEE Computer Society Press, Los Alamitos, CA, 430--434.Google Scholar
- Dittmann, J., Fiebig, T., and Steinmetz, R. 2000. New approach for transformation-invariant image and video watermarking in the spatial domain: self-spanning patterns (SSP). In Proceedings of SPIE. 176--186.Google Scholar
- Dong, P., Brankov, J. G., Galatsanos, N., and Yang, Y. 2002. Geometric robust watermarking based on a new mesh model correction approach. In Proceedings of the IEEE International Conference on Image Processing. Vol. 3. IEEE Computer Society Press, Los Alamitos, CA, 493--496.Google Scholar
- Dong, P. and Galatsanos, N. P. 2002. Affine transformation resistant watermarking based on image normalization. In Proceedings of the IEEE International Conference on Image Processing. Vol. 3. IEEE Computer Society Press, Los Alamitos, CA, 489--492.Google Scholar
- Duric, Z., Johnson, N., and Jajodia, S. 1999. Recovering watermarks from images. In Informaion & Software Engineering Tech. Rep. ISE-TR-99-04.Google Scholar
- Farzam, M. and Shirani, S. 2001. A robust multimedia watermarking technique using Zernike transform. In Proceedings of the IEEE International Workshop Multimedia Signal Processing. IEEE Computer Society Press, Los Alamitos, CA, 529--534.Google Scholar
- Gonzalez, R. and Woods, R. 2002. Digital image processing. ISBN: 0-20-118075-8. Prentice Hall, Englewood, Cliffs, NJ. Google ScholarDigital Library
- Harris, C. and Stephen, M. 1988. A combined corner and edge detector. In Proceedings of the 4th Alvey Vision Conference. 147--151.Google Scholar
- Hearn, D. and Baker, M. 1997. Computer graphics. Prentice Hall, Englewood Cliffs, NJ, ISBN:0-13-530924-7. Google ScholarDigital Library
- Herrigel, A., O'Ruanaidh, J. J. K., Petersen, H., Pereira, S., and Pun, T. 1998. Secure copyright protection techniques for digital images. In Proceedings of the International Workshop on Information Hiding. 169--190.Google Scholar
- Herrigel, A., Voloshynovskiy, S., and Rytsar, Y. 2001. The watermark template attack. In Proceedings of the SPIE Security and Watermarking of Multimedia Contents III. Vol. 4314. 394--405.Google Scholar
- Horner, J. and Gianino, P. 1984. Phase-only matched filter. Appl. Optics 23, 6, 812--816.Google ScholarCross Ref
- Hsu, C. T. and Tsai, Y. S. 2003. Video object watermarking by quadratic region decomposition and tessellation. Images and Recognition 9, 1 (Mar.).Google Scholar
- Hsu, Y. and Arsenault, H. 1982. Optical pattern recognition using circular harmonic expansion. Appl. Optics 21, 4012--4015.Google ScholarCross Ref
- Hu, M. 1962. Visual pattern recognition by moment invariants. IRE Trans. Inf. Theory IT-8, 8, 1409--1420.Google Scholar
- Kankanhalli, M. and Ramakrishman, R. 1998. Content based watermarking of images. Proceedings of ACM Multimedia, ACM, New York, 61--70. Google ScholarDigital Library
- Khotanzad, A. and Hong, Y. 1990. Invariant image recognition by Zernike moments. IEEE Trans. Patt. Anal. Mach. Intell. 12, 489--497. Google ScholarDigital Library
- Kim, H., Baek, Y., and Lee, H. 2003a. Rotation, scale and translation invariant image watermark using higher order spectra. Optica Eng. 42, 2, 340--349.Google ScholarCross Ref
- Kim, H., Baek, Y., Lee, H., and Suh, Y. 2003b. Watermark using Radon transform and bispectrum invariants. In Proceedings of IH 2002. Lecture Notes in Computer Science, vol. 2978. Springer-Verlag, New York, 145--159. Google ScholarDigital Library
- Kim, B., Choi, J., and Park, K. 2004. RST-resistant image watermarking using invariant centroid and reordered Fourier-Mellin transform. In Proceedings of IWDW' 2003. Lecture Notes in Computer Science, vol. 2939. Springer-Verlag, New York, 370--381.Google Scholar
- Kim, H. and Kumar, B. V. 2004. Rotation-tolerant watermark detection using circular harmonic function correlation filter. In Digital Watermarking. Lecture Notes in Computer Science, vol. 2939. Springer-Verlag, New York, 263--276.Google Scholar
- Kim, H. S. and Lee, H.-K. 2003. Invariant image watermark using Zernike moments. IEEE Trans. Circ. Syst. Video Tech. 13, 8, 766--775. Google ScholarDigital Library
- Koch, E. and Zhao, J. 1995. Towards robust and hidden image copyright labeling. In Proceedings of the IEEE Workshop on Nonlinear Signal and Image Processing. IEEE Computer Society Press, Los Alamitos, CA, 452--455.Google Scholar
- Kuglin, C. and Hines, D. 1975. The phase correlation image alignment method. In Proceedings of the IEEE 1975 International Conference on Cybernetrics and Society. IEEE Computer Society Press, Los Alamitos, CA, 163--165.Google Scholar
- Kumar, B., Mahalanobis, A., and Takessian, A. 2000. Optimal tradeoff circular harmonic function correlation filter methods providing controlled in-plane rotation response. IEEE Trans. Image Process. 9, 6, 1025--1034. Google ScholarDigital Library
- Kundur, D. and Hatzinakos, D. 1997. A robust digital image watermarking method using wavelet based fusion. In Proceedings of the IEEE International Conference on Image Processing. Vol. 1. IEEE Computer Society Press, Los Alamitos, CA, 544--547. Google ScholarDigital Library
- Kundur, D. and Hatzinakos, D. 1999. Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 87. 1167--1179.Google Scholar
- Kurah, C. and McHughes, J. 1992. A cautionary note on image downgrading. In Proceedings of the IEEE Computer Security Applications Conference. Vol. 2. IEEE Computer Society Press, Los Alamitos, CA, 153--159.Google Scholar
- Kutter, M. 1998. Watermarking resisting to translation, rotation and scaling. In Proceedings of the SPIE: Multimedia Systems and Applications. Vol. 3528, (Nov.). 423--431.Google Scholar
- Kutter, M., Bhattacharjee, S., and Ebrahimi, T. 1999. Towards second generation watermarking schemes. In Proceedings of the IEEE International Conference on Image Processing '99. Vol. I. IEEE Computer Society Press, Los Alamitos, CA, 320--323.Google Scholar
- Kutter, M., Voloshynovskiy, S., and Herrigel, A. 2000. The watermark copy attack. In Proceedings of Electronic Imaging 2000, Security and Watermarking of Multimedia Content II. Vol. 3971.Google Scholar
- Lin, C., Wu, M., Bloom, J., Cox, I., Miller, M., and Lui, Y. 2001. Rotation, scale, and translation resilient watermarking for images. IEEE Trans. Image Process. 10, 5, 767--782. Google ScholarDigital Library
- Linnartz, J., Kaler, T., Depovere, G., and Beuker, R. 1997. A reliability model for the detection of electronic watermarks in digital images. In Proceedings of the IEEE Fifth Symposium on Communication and Vehicular Technology. IEEE Computer Society Press, Los Alamitos, CA, 202--209.Google Scholar
- Liu, Y. and Zhao, J. 2003. A new filtering method for RST invariant image watermarking. In Proceedings of the IEEE International Workshop on Haptic, Audio and Visual Environments and Their Applications. IEEE Computer Society Press, Los Alamitos, CA, 101--106.Google Scholar
- Liu, Y. and Zhao, J. 2004a. A rectification scheme for RST invariant image watermarking. In Proceedings of the Canadian Conference on Electrical and Computer Engineering. 527--530.Google Scholar
- Liu, Y. and Zhao, J. 2004b. Rotation, scaling, and translation invariant image watermarking based on Radon transform. In Proceedings of the Canadian Conference on Computer and Robot Vision. 225--232. Google ScholarDigital Library
- Liu, Y., Zheng, D., and Zhao, J. 2005. A rectification scheme for RST invariant image watermarking. IEICE Trans. Fundament. (Special Section on Cryptography and Information Security) E88-A, 1.Google Scholar
- Lu, C. S., Liao, H. Y., and Kutter, M. 2002. Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector. IEEE Trans. Image Process. 11, 3, 280--292. Google ScholarDigital Library
- Maes, M., Kalker, T., Linnartz, J., Talstra, J., Depovere, G., and Haitsma, J. 2000. Digital watermarking for DVD video copy protection. IEEE Signal Processing Magazine, 47--57.Google Scholar
- Merhav, N. 2005. An information-theoretic view of watermark embedding-detection and geometric attacks. In Proceedings of WaCha 05, (Barcelona, Spain).Google Scholar
- Mihcak, M. K., Kozintsev, I., and Ramchandran, K. 1999. Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). Vol. 6. IEEE Computer Society Press, Los Alamitos, CA, 3253--3256. Google ScholarDigital Library
- Moulin, P. 2002. A mathematical approach to watermarking and data hiding. In ICASSP Tutorial.Google Scholar
- Natarajan, B. K. 1995. Filtering random noise from deterministic signals via data compression. IEEE Trans. Signal Process. 43, 11, 2595--2605. Google ScholarDigital Library
- Oppenheim, A. and Lim, J. 1981. Importance of phase in signals. Proc. IEEE 69, 529--541.Google ScholarCross Ref
- O'Ruanaidh, J., Dowling, W., and Boland, F. 1995. Watermarking digital images for copyright protection. In Proceedings of the IEEE International Conference on Vision, Image and Signal Processing. IEEE Computer Society Press, Los Alamitos, CA, 250--256.Google Scholar
- O'Ruanaidh, J., Dowling, W., and Boland, F. 1996. Phase watermarking of digital images. In Proceedings of the IEEE International Conference on Image Processing. IEEE Computer Society Press, Los Alamitos, CA, 239--242.Google Scholar
- O'Ruanaidh, J. and Pun, T. 1998. Rotation, scale, and translation invariant digital image watermarking. Signal Process. 66, 3, 303--317. Google ScholarDigital Library
- Pawlak, M. and Xin, Y. 2002. Robust image watermarking: an invariant domain approach. In Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). Vol. 2. IEEE Computer Society Press, Los Alamitos, CA, 885--888.Google Scholar
- Pereira, S., O'Ruanaidh, J., and Deguillaume, F. 1999. Template based recovery of Fourier-based watermarks using log-polar and log-log maps. In Proceedings of the IEEE International Conference on Multimedia Computing and System. IEEE Computer Society Press, Los Alamitos, CA, Vol. 1. 870--874. Google ScholarDigital Library
- Pereira, S. and Pun, T. 2000. Robust template matching for affine resistant image watermarks. IEEE Trans. Image Process. 9, 6, 1123--1129. Google ScholarDigital Library
- Pickholtz, R., Schilling, D., and Milstein, L. 1982. Theory of spread spectrum communications---a tutorial. IEEE Trans. Commun. 30, 5, 855--884.Google ScholarCross Ref
- Prudyus, I., Voloshynovskiy, S., and Synyavskyy, A. 2001. Wavelet-based MAP image denoising using provably better class of stochastic i.i.d. image models. In Proceedings of the 5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service. Vol. 2. 583--586.Google Scholar
- Refregier, P. 1991. Optimal trade-off filters for noise robustness, sharpness of the correlation peak, and Horner efficiency. Optics Lett. 16, 11, 829--832.Google ScholarCross Ref
- Sadler, B. 1989. Shift and rotation invariant object recognition using the bispectrum. In Proceedings of the Workshop on Higher Order Spectral Analysis. 106--111.Google ScholarCross Ref
- Simitopoulos, D., Koutsonanos, D. E., and Strintzis, M. G. 2002. Image watermarking resistant to geometric attacks using generalized Radon transformations. In Proceedings of DSP 2002. Vol. 1. 85--88.Google Scholar
- Simitopoulos, D., Koutsonanos, D. E., and Strintzis, M. G. 2003. Robust image watermarking based on generalized Radon transformations. IEEE Trans. Circ. Syst. Video Tech. 13, 8, 732--745. Google ScholarDigital Library
- Stirmark. http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark.Google Scholar
- Sun, Q., Wu, J., and Deng, R. 1999. Recovering modified watermarked image with reference to original image. In Proceedings of SPIE. 415--424.Google Scholar
- Tang, C. W. and Hang, H. M. 2003. A feature-based robust digital image watermarking scheme. IEEE Trans. Sig. Process. 51, 4 (April), 950--959. Google ScholarDigital Library
- Teh, C.-H. and Chin, R. T. 1988. On image analysis by the method of moments. IEEE Trans. Patt. Anal. Mach. Intell. 10, 4, 496--513. Google ScholarDigital Library
- Tirkel, A., Rankin, G., Schyndel, R. V., Ho, W., Mee, N., and Osborne, C. 1993. Electronic watermark. In Proceedings of DICTA. 666--672.Google Scholar
- Vijaya Kumar, B. V. K., Mahalanobis, A., and Takessian, A. 2000. Optimal tradeoff circular Harmonic function correlation filter methods providing in-plane rotation response. IEEE Trans. Image Proc. 9, 6, 1025--1034. Google ScholarDigital Library
- Voloshynovskiy, S., Deguillaume, F., and Pun, T. 2001. Multibit digital watermarking robust against local nonlinear geometrical distortions. In Proceedings of the IEEE International Conference on Image Processing (ICIP). IEEE Computer Society Press, Los Alamitos, CA, 999--1002.Google Scholar
- Voloshynovskiy, S., Deguillaume, F., and Pun, T. 2000a. Content adaptive watermarking based on a stochastic multiresolution image modeling. In Proceedings of EUSIPCO2000, X Europian Signal Processing Conference.Google Scholar
- Voloshynovskiy, S., Herrigel, A., Baumgartner, N., and Pun, T. 1999. A stochastic approach to content adaptive digital image watermarking. In Proceedings of the 3rd International Workshop on Information Hiding. Vol. 1768. 211--236. Google ScholarDigital Library
- Voloshynovskiy, S., Pereira, S., Herrigel, A., Baumgartner, N., and Pun, T. 2000b. Generalized watermark attack based on watermark estimation and perceptual remodulation. In Proceedings of Electronic Imaging 2000: Security and Watermarking of Multimedia Content. Vol. 3971.Google Scholar
- Xin, Y., Liao, S., and Pawlak, M. 2004. Geometrically robust image watermarking via pseudo Zernike momens. In Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE Computer Society Press, Los Alamitos, CA., 939--942.Google Scholar
- Yao, J. P. and Chin, L. 1999. Power-adjusted fractional power radial harmonic filters for shift- and scale-invariant pattern recognition with improved noise robustness and discrimination. Optics Commun. 162, 1--3, 26--30.Google ScholarCross Ref
- Yao, J. P. and Lebreton, G. 1998. Scale-invariant correlation with truncated phase-only radial harmonic Fitlers. Optics Commun. 145, 1--6, 213--219.Google ScholarCross Ref
- Young, D. 2000. Straight lines and circles in the log-polar image. In BMVC2000: Proceedings of the 11th British Machine Vision Conference. 426--435.Google ScholarCross Ref
- Zhao, J., Hayasaka, R., Muranoi, R., Ito, M., and Matsushita, Y. 2000. A video copyright protection system based on contentID. IEICE Trans. Inf. Syst. E83-D, 12, 2131--2141.Google Scholar
- Zheng, D. and Zhao, J. 2003a. LPM-based RST invariant digital image watermarking. In Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE Computer Society Press, Los Alamitos, CA, 1951--1954.Google Scholar
- Zheng, D. and Zhao, J. 2003b. RST invariant digital image watermarking: importance of phase information. In Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE Computer Society Press, Los Alamitos, CA, 785--788.Google Scholar
- Zheng, D., Zhao, J., and Saddik, A. EL. 2003a. RST invariant digital image watermarking based on log-polar mapping and phase correlation. IEEE Trans. Circ. Syst. Video Tech. 13, 753--765. Google ScholarDigital Library
- Zheng, D., Zhao, J., Tam, W., and Speranza, F. 2003b. Image quality measurement by using digital watermarking. In Proceedings of the IEEE International Workshop on Haptic, Audio and Visual Environments and their Applications. IEEE Computer Society Press, Los Alamitos, CA, 65--70.Google Scholar
Index Terms
- A survey of RST invariant image watermarking algorithms
Recommendations
RST Invariant digital image watermarking based on a new phase-only filtering method
Watermarked image may undergo geometric transforms which make watermark detection difficult or impossible. This paper presents a new rotation, scaling, and translation (RST) invariant digital image watermarking scheme based on log-polar mapping and a ...
An image rectification scheme and its applications in RST invariant digital image watermarking
AbstractThis paper presents an image rectification scheme that can be used by any image watermarking algorithm to provide robustness against rotation, scaling and translation (RST) transformations. Rotation and scaling transformations in the spatial ...
The RST invariant digital image watermarking using Radon transforms and complex moments
Many digital image watermarking techniques are sensitive to geometric distortions. These distortions can destroy the synchronization between the watermark and the watermarked image to make it difficult or even impossible to detect and extract the ...
Comments