A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression

被引:225
作者
Kang, XG [1 ]
Huang, JW
Shi, YQ
Lin, Y
机构
[1] Sun Yat Sen Univ, Dept Elect & Commun Engn, Guangzhou 510275, Peoples R China
[2] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
基金
美国国家科学基金会;
关键词
affine transformation; geometric attacks; image watermarking; robustness; template matching;
D O I
10.1109/TCSVT.2003.815957
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Robustness,is one of the crucial important issues in watermarking. Robustness against geometric distortion and JPEG compression at the same time with blind extraction remains especially challenging. In this paper, a blind discrete wavelet transform-discrete Fourier transform (DWT-DFT) composite image watermarking algorithm that is robust against both affine transformation and JPEG. compression is proposed. This algorithm improves the robustness via using new embedding strategy, watermark structure, 2-D interleaving, and synchronization technique. A spread-spectrum-based informative watermark with a training sequence are embedded in the coefficients of the LL subband in the DWT domain while a template is embedded in the middle frequency components in the DFT domain. In watermark extraction, we first detect the template in a possibly corrupted watermarked image to obtain the parameters of affine transform and convert the image back to its original shape. Then we perform translation registration by using the training sequence embedded in the DWT domain and finally extract the informative watermark Experimental works have demonstrated that the watermark generated by the proposed algorithm is more robust than other watermarking algorithms reported in the literature. Specifically it is robust against almost all affine transform related testing functions in StirMark 3.1 and JPEG compression with quality factor as low as 10 simultaneously. While the approach is presented for gray-level images, it can also be applied to color images and video sequences.
引用
收藏
页码:776 / 786
页数:11
相关论文
共 25 条
[1]  
[Anonymous], P INT C IM PROC THES
[2]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[3]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[4]   A method for the estimation and recovering from general affine transforms in digital watermarking applications [J].
Deguillaume, F ;
Voloshynovskiy, S ;
Pun, T .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :313-322
[5]  
DUGELAY JL, 2000, P SPIE SEC WAT MULT, V3971
[6]  
ELMASRY GF, 2000, P IEEE INT C MULT EX
[7]  
Fleet DJ, 1997, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL I, P532, DOI 10.1109/ICIP.1997.647967
[8]   Multimedia watermarking techniques [J].
Hartung, F ;
Kutter, M .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1079-1107
[9]   Watermarking of uncompressed and compressed video [J].
Hartung, F ;
Girod, B .
SIGNAL PROCESSING, 1998, 66 (03) :283-301
[10]   Embedding image watermarks in DC components [J].
Huang, JW ;
Shi, YQ ;
Shi, Y .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2000, 10 (06) :974-979