skip to main content
10.1145/1411328.1411339acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Self-synchronizing robust texel watermarking in gaussian scale-space

Published: 22 September 2008 Publication History

Abstract

In this paper, we propose a new second generation watermarking method for still images that embeds information in the feature space using rational dither modulation. Embedding at a fixed raster, e.g., the pixel grid, is a big problem in all first generation watermarking approaches. In contrast, our approach does not work depending on any raster. We use a texture-based feature, the so-called gray-level blob in Gaussian scale-space, which is invariant to scaling, rotation, and translation. It is associated with the image content and thus independend of image geometry. Furthermore, we show that our new method is robust against a variety of attacks, such as lossy compression, contrast and luminance enhancement, bluring and sharpening as well as noise adding. In addition, due to embedding at no fixed raster and insertion/deletion error correction even after slight image cropping the watermark can be extracted.

References

[1]
M. Awrangjeb, M. Murshed, and G. Lu. Global geometric distortion correction in images. In Proc. of IEEE Workshop on Multimedia Signal Processing, pages 435--440, Sept. 2006.
[2]
P. Bas, J.-M. Chassery, and B. Macq. Robust watermarking based on the warping of pre-defined triangular patterns. In Proc. of SPIE Security and Watermarking of Multimedia Contents II, pages 99--109, Jan. 2000.
[3]
P. Bas, J.-M. Chassery, and B. Macq. Geometrically invariant watermarking using feature points. IEEE Transactions on Image Processing, 11(9):1014--1028, Sept. 2002.
[4]
B. Chen and G. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47(4):1423--1443, May 2001.
[5]
J. Dittmann, T. Fiebig, and R. Steinmetz. A new approach for transformation invariant image and video watermarking in the spatial domain: Ssp - self spanning patterns. In Proc. of SPIE Security and Watermarking of Multimedia Contants II, pages 176--185, Jan. 2000.
[6]
J. J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod. Scalar costa scheme for information embedding. IEEE Transactions on Signal Processing, 51(4):1003--1019, Apr. 2003.
[7]
M. Kutter, S. K. Bhattacharjee, and T. Ebrahimi. Towards second generation watermarking schemes. In Proc. of IEEE International Conference on Image Processing, pages 320--323, Oct. 1999.
[8]
T. Lindeberg. Feature detection with automatic scale selection. International Journal of Computer Vision, 30(2):77--116, Nov. 1998.
[9]
C.-S. Lu, S.-W. Sun, and P.-C. Chang. Robust hash--based image watermarking with resistance to geometric distortions and watermark-estimation attack. In Proc. of SPIE Security, Steganography, and Watermarking of Multimedia Contents VII, pages 147--163, Jan. 2005.
[10]
M. J. J. J. B. Maes and van C. W. A. M. Overveld. Digital watermarking by geometric warping. In Proc. of IEEE International Conference on Image Processing, pages 424--426, Oct. 1998.
[11]
F. Pérez-González, C. Mosquera, M. Barni, and A. Abrardo. Rational dither modulation: A novel data-hiding method robust to value-matric scaling attacks. In Proc. of IEEE Workshop on Multimedia Signal Processing, pages 139--142, Sept. 2004.
[12]
D. Pröfrock, M. Schlauweg, and E. Müller. Content-based watermarking by geometric warping and feature-based image segmentation. In Proc. of IEEE/ACM International Conference on Signal-Image Technology & Internet-Based Systems, pages 572--581, Dec. 2006.
[13]
M. Schlauweg, D. Pröfrock, and E. Müller. Soft feature-based watermark decoding with insertion/deletion correction. In Proc. of Information Hiding Workshop, pages 236--250, June 2007.
[14]
M. Schlauweg, D. Pröfrock, and E. Müller. Correction of insertions and deletions in selective watermarking. In Proc. of IEEE/ACM International Conference on Signal-Image Technology & Internet-Based Systems, (to appear), Nov. 2008.
[15]
J. Seo and C. D. Yoo. Image watermarking based on scale-space representation. In Proc. of SPIE Security, Steganography, and Watermarking of Multimedia Contents VI, pages 560--570, Jan. 2004.
[16]
V. Solachidis, N. Nikolaidis, and I. Pitas. Watermarking polygonal lines using fourier descriptors. In Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, pages 1955--1958, June 2000.
[17]
K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran. Robust image-adaptive data hiding using erasures and error correction. IEEE Transactions on Image Processing, 13(12):1612--1639, Dec. 2004.
[18]
C.-W. Tang and M.-H. Hang. A feature-based robust digital image watermarking scheme. IEEE Transactions on Signal Processing, 51(4):950--959, Apr. 2003.
[19]
J. Weinheimer, X. Qi, and J. Qi. Towards a robust feature-based watermarking scheme. In Proc. of IEEE International Conference on Image Processing, pages 1401--1404, Oct. 2006.
[20]
D. Zheng, Y. Liu, J. Zhao, and S. E. Saddik. A survey of rst invariant image watermarking algorithms. ACM Computing Surveys, 39(2), 2007.

Cited By

View all
  • (2018)A new robust video watermarking algorithm based on SURF features and block classificationMultimedia Tools and Applications10.1007/s11042-016-4226-077:1(327-345)Online publication date: 1-Jan-2018
  • (2013)A novel approach to digital watermarking, exploiting colour spacesSignal Processing10.1016/j.sigpro.2012.10.01893:5(1268-1294)Online publication date: 1-May-2013
  • (2008)Correction of Insertions and Deletions in Selective WatermarkingProceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems10.1109/SITIS.2008.26(277-284)Online publication date: 30-Nov-2008

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and security
September 2008
242 pages
ISBN:9781605580586
DOI:10.1145/1411328
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 September 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. digital watermarking
  2. gaussian scale-space
  3. insertion/deletion error correction
  4. rst-invariant
  5. texture-based feature points

Qualifiers

  • Research-article

Conference

MM&Sec '08
Sponsor:
MM&Sec '08: Multimedia and Security Workshop
September 22 - 23, 2008
Oxford, United Kingdom

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2018)A new robust video watermarking algorithm based on SURF features and block classificationMultimedia Tools and Applications10.1007/s11042-016-4226-077:1(327-345)Online publication date: 1-Jan-2018
  • (2013)A novel approach to digital watermarking, exploiting colour spacesSignal Processing10.1016/j.sigpro.2012.10.01893:5(1268-1294)Online publication date: 1-May-2013
  • (2008)Correction of Insertions and Deletions in Selective WatermarkingProceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems10.1109/SITIS.2008.26(277-284)Online publication date: 30-Nov-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media