1
|
Hua C, Wu Y, Shi Y, Hu M, Xie R, Zhai G, Zhang XP. Steganography for medical record image. Comput Biol Med 2023; 165:107344. [PMID: 37603961 DOI: 10.1016/j.compbiomed.2023.107344] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/16/2023] [Revised: 07/31/2023] [Accepted: 08/07/2023] [Indexed: 08/23/2023]
Abstract
Medical record images in EHR system are users' privacy and an asset, and there is an urgent need to protect this data. Image steganography can offer a potential solution. A steganographic model for medical record images is therefore developed based on StegaStamp. In contrast to natural images, medical record images are document images, which can be very vulnerable to image cropping attacks. Therefore, we use text region segmentation and watermark region localization to combat the image cropping attack. The distortion network has been designed to take into account the distortion that can occur during the transmission of medical record images, making the model robust against communication induced distortions. In addition, based on StegaStamp, we innovatively introduced FISM as part of the loss function to reduce the ripple texture in the steganographic image. The experimental results show that the designed distortion network and the FISM loss function term can be well suited for the steganographic task of medical record images from the perspective of decoding accuracy and image quality.
Collapse
Affiliation(s)
- Chunjun Hua
- Shanghai Key Laboratory of Multidimensional Information Processing, East China Normal University, 500 Dongchuan Road, Shanghai 200241, China
| | - Yue Wu
- Ophthalmology Department, Shanghai Ninth People's Hospital, Shanghai Jiao Tong University School of Medicine, 639 Zhizaoju Road, Shanghai 200011, China
| | - Yiqiao Shi
- Shanghai Key Laboratory of Multidimensional Information Processing, East China Normal University, 500 Dongchuan Road, Shanghai 200241, China.
| | - Menghan Hu
- Shanghai Key Laboratory of Multidimensional Information Processing, East China Normal University, 500 Dongchuan Road, Shanghai 200241, China.
| | - Rong Xie
- Institute of Image Communication and Network Engineering, Shanghai Jiao Tong University, 800 Dongchuan Road, Shanghai 200241, China.
| | - Guangtao Zhai
- Institute of Image Communication and Network Engineering, Shanghai Jiao Tong University, 800 Dongchuan Road, Shanghai 200241, China.
| | - Xiao-Ping Zhang
- Department of Electrical, Computer and Biomedical Engineering, Ryerson University, 350 Victoria Street, Toronto M5B 2K3, Canada.
| |
Collapse
|
2
|
Zhang C, Nasir A, Ni B, Xu B, Xue L, Liu X, Xiong J. Portable PIMI polarization imaging device based on automatic polarization recognition. APPLIED OPTICS 2023; 62:3225-3232. [PMID: 37133173 DOI: 10.1364/ao.484465] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/04/2023]
Abstract
This paper proposes a new portable polarization parametric indirect microscopy imaging without a liquid crystal (LC) retarder. The polarization was modulated by a polarizer automatically rotating when the camera took raw images sequentially. A specific mark tagged the polarization states of each camera's snapshot in the optical illumination path. A computer vision portable polarization parametric indirect microscopy imagrecognition algorithm was developed to retrieve the unknown polarization states from each raw camera image to ensure that the right polarization modulation states were used in the PIMI processing algorithm. The system's performance was verified by obtaining PIMI parametric images of human facial skin. The proposed method avoids the error problem caused by the LC modulator and significantly reduces the whole system's cost.
Collapse
|
3
|
Fourier Image Watermarking: Print-Cam Application. ELECTRONICS 2022. [DOI: 10.3390/electronics11020266] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]
Abstract
Digital image watermarking is an active research field since it provides protection, security, and authenticity of data. This paper presents development and implementation of a blind and robust watermarking application for ID images under a print-cam system. In the present case, the images are watermarked and printed on ID cards and then detected freehandedly with a smartphone camera. In order to design an efficient and robust image watermarking application, the attacks produced in print-cam processes, such as geometric distortions, must be resolved. Accordingly, the proposed watermarking approach is applied in the Fourier domain. Then, a frame-based projective rectification is integrated to deal with geometric distortions by using detection of Hough lines. Moreover, better robustness against print-cam watermarking attacks was achieved compared with the existing methods, and an Android application was designed and implemented based on the proposed scheme.
Collapse
|
4
|
Liu X, Wang Y, Sun Z, Wang L, Zhao R, Zhu Y, Zou B, Zhao Y, Fang H. Robust and discriminative zero-watermark scheme based on invariant features and similarity-based retrieval to protect large-scale DIBR 3D videos. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.06.066] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
|
5
|
Hu R, Xiang S. Cover-Lossless Robust Image Watermarking Against Geometric Deformations. IEEE TRANSACTIONS ON IMAGE PROCESSING : A PUBLICATION OF THE IEEE SIGNAL PROCESSING SOCIETY 2020; 30:318-331. [PMID: 33186107 DOI: 10.1109/tip.2020.3036727] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
Cover-lossless robust watermarking is a new research issue in the information hiding community, which can restore the cover image completely in case of no attacks. Most countermeasures proposed in the literature usually focus on additive noise-like manipulations such as JPEG compression, low-pass filtering and Gaussian additive noise, but few are resistant to challenging geometric deformations such as rotation and scaling. The main reason is that in the existing cover-lossless robust watermarking algorithms, those exploited robust features are related to the pixel position. In this article, we present a new cover-lossless robust image watermarking method by efficiently embedding a watermark into low-order Zernike moments and reversibly hiding the distortion due to the robust watermark as the compensation information for restoration of the cover image. The amplitude of the exploited low-order Zernike moments are: 1) mathematically invariant to scaling the size of an image and rotation with any angle; and 2) robust to interpolation errors during geometric transformations, and those common image processing operations. To reduce the compensation information, the robust watermarking process is elaborately and luminously designed by using the quantized error, the watermarked error and the rounded error to represent the difference between the original and the robust watermarked image. As a result, a cover-lossless robust watermarking system against geometric deformations is achieved with good performance. Experimental results show that the proposed robust watermarking method can effectively reduce the compensation information, and the new cover-lossless robust watermarking system provides strong robustness to those content-preserving manipulations including scaling, rotation, JPEG compression and other noise-like manipulations. In case of no attacks, the cover image can be recovered without any loss.
Collapse
|
6
|
Kim WH, Kang J, Mun SM, Hou JU. Convolutional Neural Network Architecture for Recovering Watermark Synchronization. SENSORS (BASEL, SWITZERLAND) 2020; 20:E5427. [PMID: 32971823 PMCID: PMC7570697 DOI: 10.3390/s20185427] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/10/2020] [Revised: 09/17/2020] [Accepted: 09/17/2020] [Indexed: 11/23/2022]
Abstract
In this paper, we propose a convolutional neural network-based template architecture that compensates for the disadvantages of existing watermarking techniques that are vulnerable to geometric distortion. The proposed template consists of a template generation network, a template extraction network, and a template matching network. The template generation network generates a template in the form of noise and the template is inserted into certain pre-defined spatial locations of the image. The extraction network detects spatial locations where the template is inserted in the image. Finally, the template matching network estimates the parameters of the geometric distortion by comparing the shape of spatial locations where the template was inserted with the locations where the template was detected. It is possible to recover an image in its original geometrical form using the estimated parameters, and as a result, watermarks applied using existing watermarking techniques that are vulnerable to geometric distortion can be decoded normally.
Collapse
Affiliation(s)
- Wook-Hyung Kim
- Visual Display Division, Samsung Electronics, Suwon 16677, Korea;
| | - Jihyeon Kang
- Graduate School of Information Security, Korea Advanced Institute of Science and Technology, Daejeon 34141, Korea;
| | - Seung-Min Mun
- School of Computing, Korea Advanced Institute of Science and Technology, Daejeon 34141, Korea;
| | - Jong-Uk Hou
- School of Software, Hallym University, Chuncheon 24252, Korea
| |
Collapse
|
7
|
Zhang M, Ni R, Zhao Y. A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS 2019. [DOI: 10.4018/ijdcf.2019100103] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Abstract
A blind print-recapture robust watermark scheme is proposed. Watermark patterns are embedded into the space domain of a color image and can be detected from a print-recaptured version of the image without knowledge of the original image. The process of embedding invisible watermarks to convert RGB color images to CIE Lab color spaces and embed periodic watermarks in both color channels at the same time. Watermark extraction is achieved by calculating self-convolution and inverting the geometric transformation such as rotation and scale. Normalized correlation coefficients between the extracted and the embedded watermark pattern is calculated to determine whether there is watermark. The decision about the presence/absence of the watermark pattern is then determined by a threshold which is set 0.13, and the detection rate of 241 pictures is about 0.79.
Collapse
Affiliation(s)
- Mengmeng Zhang
- Beijing Key Laboratory of Advanced Information Science and Network Technology, Beijing Jiaotong Univ, Beijing, China
| | - Rongrong Ni
- Beijing Key Laboratory of Advanced Information Science and Network Technology, Beijing Jiaotong Univ, Beijing, China
| | - Yao Zhao
- Beijing Key Laboratory of Advanced Information Science and Network Technology, Beijing Jiaotong Univ, Beijing, China
| |
Collapse
|
8
|
Adaptive segmentation-based feature extraction and S-STDM watermarking method for color image. Neural Comput Appl 2019. [DOI: 10.1007/s00521-019-04428-x] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
9
|
A Large Capacity Histogram-Based Watermarking Algorithm for Three Consecutive Bins. APPLIED SCIENCES-BASEL 2018. [DOI: 10.3390/app8122617] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
The histogram watermark, which performs watermark embedding by slightly modifying the histogram of the original image, has been a hot research topic in information hiding technology due to the superiority of its pixel modification during the watermark embedding process, which is independent of the pixel position. This property makes the histogram-based watermark strong resistant to geometric attacks, such as cropping attack, crossed attack, rotation attack, etc. In this paper, we propose a large capacity histogram-based robust watermarking algorithm based on three consecutive bins for the first time. In our scheme, we divide the shape of three consecutive bins into eight cases. According to these cases, we embed Information Number 0, 1, 2, 3, 4, 5, 6, or 7, respectively. The embedded information capacity reaches one bit per bin (bpb), and the amount of embedded information is equal to 200% of the previous existing algorithms. Experimental results show that the new algorithm not only has a large capacity of embedding information, but also has strong robustness to geometric attacks, as well as common image processing operations.
Collapse
|
10
|
|
11
|
Human motion segmentation and recognition using machine vision for mechanical assembly operation. SPRINGERPLUS 2016; 5:1629. [PMID: 27722048 PMCID: PMC5031581 DOI: 10.1186/s40064-016-3279-x] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/04/2016] [Accepted: 09/09/2016] [Indexed: 12/02/2022]
Abstract
The observation, decomposition and record of motion are usually accomplished through artificial means during the process of motion analysis. This method not only has a heavy workload, its efficiency is also very low. To solve this problem, this paper proposes a novel method to segment and recognize continuous human motion automatically based on machine vision for mechanical assembly operation. First, the content-based dynamic key frame extraction technology was utilized to extract key frames from video stream, and then automatic segmentation of action was implemented. Further, the SIFT feature points of the region of interest (ROIs) were extracted, on the basis of which the characteristic vector of the key frame was derived. The feature vector can be used not only to represent the characteristic of motion, but also to describe the connection between motion and environment. Finally, the classifier is constructed based on support vector machine (SVM) to classify feature vectors, and the type of therblig is identified according to the classification results. Our approach enables robust therblig recognition in challenging situations (such as changing of light intensity, dynamic backgrounds) and allows automatic segmentation of motion sequences. Experimental results demonstrate that our approach achieves recognition rates of 96.00 % on sample video which captured on the assembly line.
Collapse
|
12
|
Ji F, Deng C, An L, Huang D. Desynchronization attacks resilient image watermarking scheme based on global restoration and local embedding. Neurocomputing 2013. [DOI: 10.1016/j.neucom.2012.09.032] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
13
|
|
14
|
Abdul W, Carré P, Gaborit P. Error correcting codes for robust color wavelet watermarking. EURASIP JOURNAL ON INFORMATION SECURITY 2013. [DOI: 10.1186/1687-417x-2013-1] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022] Open
Abstract
Abstract
This article details the conception, design, development and analysis of invisible, blind and robust color image watermarking algorithms based on the wavelet transform. Using error correcting codes, the watermarking algorithms are designed to be robust against intentional or unintentional attacks such as JPEG compression, additive white Gaussian noise, low pass filter and color attacks (hue, saturation and brightness modifications). Considering the watermarking channel characterized by these attacks, repetition, Hamming, Bose Chaudhuri Hocquenghem and Reed-Solomon codes are used in order to improve the robustness using different modes and appropriate decoding algorithms. The article compares the efficiency of different type of codes against different type of attacks. To the best of our knowledge this is the first time that the effect of error-correcting codes against different attacks are detailed in a watermarking context in such a precise way: describing and comparing the effect of different classes of codes against different type of attacks. This article clearly shows that list decoding of Reed-Solomon codes using the algorithm of Sudan exhibits good performance against hue and saturation attacks. The use of error correcting codes in a concatenation mode allows the non-binary block codes to show good performance against JPEG compression, noise and brightness attacks.
Collapse
|
15
|
Li L, Li S, Abraham A, Pan JS. Geometrically invariant image watermarking using Polar Harmonic Transforms. Inf Sci (N Y) 2012. [DOI: 10.1016/j.ins.2012.02.062] [Citation(s) in RCA: 88] [Impact Index Per Article: 7.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
|
16
|
Chen TY, Hwang MS, Jan JK. A secure image authentication scheme for tamper detection and recovery. THE IMAGING SCIENCE JOURNAL 2012. [DOI: 10.1179/1743131x11y.0000000018] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/31/2022]
|
17
|
Zhang H, Shu H, Coatrieux G, Zhu J, Wu QMJ, Zhang Y, Zhu H, Luo L. Affine Legendre moment invariants for image watermarking robust to geometric distortions. IEEE TRANSACTIONS ON IMAGE PROCESSING : A PUBLICATION OF THE IEEE SIGNAL PROCESSING SOCIETY 2011; 20:2189-2199. [PMID: 21342852 PMCID: PMC3378516 DOI: 10.1109/tip.2011.2118216] [Citation(s) in RCA: 18] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/30/2023]
Abstract
Geometric distortions are generally simple and effective attacks for many watermarking methods. They can make detection and extraction of the embedded watermark difficult or even impossible by destroying the synchronization between the watermark reader and the embedded watermark. In this paper, we propose a new watermarking approach which allows watermark detection and extraction under affine transformation attacks. The novelty of our approach stands on a set of affine invariants we derived from Legendre moments. Watermark embedding and detection are directly performed on this set of invariants. We also show how these moments can be exploited for estimating the geometric distortion parameters in order to permit watermark extraction. Experimental results show that the proposed watermarking scheme is robust to a wide range of attacks: geometric distortion, filtering, compression, and additive noise.
Collapse
Affiliation(s)
- Hui Zhang
- Laboratory of Image Science and Technology, Department of Computer Science and Engineering, Southeast University, Nanjing, China.
| | | | | | | | | | | | | | | |
Collapse
|
18
|
Tsai JS, Huang WB, Kuo YH. On the selection of optimal feature region set for robust digital image watermarking. IEEE TRANSACTIONS ON IMAGE PROCESSING : A PUBLICATION OF THE IEEE SIGNAL PROCESSING SOCIETY 2011; 20:735-743. [PMID: 20833602 DOI: 10.1109/tip.2010.2073475] [Citation(s) in RCA: 10] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/29/2023]
Abstract
A novel feature region selection method for robust digital image watermarking is proposed in this paper. This method aims to select a nonoverlapping feature region set, which has the greatest robustness against various attacks and can preserve image quality as much as possible after watermarked. It first performs a simulated attacking procedure using some predefined attacks to evaluate the robustness of every candidate feature region. According to the evaluation results, it then adopts a track-with-pruning procedure to search a minimal primary feature set which can resist the most predefined attacks. In order to enhance its resistance to undefined attacks under the constraint of preserving image quality, the primary feature set is then extended by adding into some auxiliary feature regions. This work is formulated as a multidimensional knapsack problem and solved by a genetic algorithm based approach. The experimental results for StirMark attacks on some benchmark images support our expectation that the primary feature set can resist all the predefined attacks and its extension can enhance the robustness against undefined attacks. Comparing with some well-known feature-based methods, the proposed method exhibits better performance in robust digital watermarking.
Collapse
Affiliation(s)
- Jen-Sheng Tsai
- Center for Researches of E-life DIgital Technologies, Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan 701, Taiwan
| | | | | |
Collapse
|
19
|
|
20
|
Gao X, Deng C, Li X, Tao D. Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions. ACTA ACUST UNITED AC 2010. [DOI: 10.1109/tsmcc.2009.2037512] [Citation(s) in RCA: 117] [Impact Index Per Article: 8.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
|
21
|
|
22
|
|
23
|
Tian H, Zhao Y, Ni R, Cao G. Geometrically robust image watermarking by sector-shaped partitioning of geometric-invariant regions. OPTICS EXPRESS 2009; 17:21819-21836. [PMID: 19997427 DOI: 10.1364/oe.17.021819] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/28/2023]
Abstract
In a feature-based geometrically robust watermarking system, it is a challenging task to detect geometric-invariant regions (GIRs) which can survive a broad range of image processing operations. Instead of commonly used Harris detector or Mexican hat wavelet method, a more robust corner detector named multi-scale curvature product (MSCP) is adopted to extract salient features in this paper. Based on such features, disk-like GIRs are found, which consists of three steps. First, robust edge contours are extracted. Then, MSCP is utilized to detect the centers for GIRs. Third, the characteristic scale selection is performed to calculate the radius of each GIR. A novel sector-shaped partitioning method for the GIRs is designed, which can divide a GIR into several sector discs with the help of the most important corner (MIC). The watermark message is then embedded bit by bit in each sector by using Quantization Index Modulation (QIM). The GIRs and the divided sector discs are invariant to geometric transforms, so the watermarking method inherently has high robustness against geometric attacks. Experimental results show that the scheme has a better robustness against various image processing operations including common processing attacks, affine transforms, cropping, and random bending attack (RBA) than the previous approaches.
Collapse
Affiliation(s)
- Huawei Tian
- Institute of Information Science, Beijing Jiaotong University, Beijing, China.
| | | | | | | |
Collapse
|
24
|
Kim KJ. RST Invariant Digital Watermarking Based on Image Representation by Wedges and Rings. INTERNATIONAL JOURNAL OF CONTENTS 2009. [DOI: 10.5392/ijoc.2009.5.2.026] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022] Open
|
25
|
Zheng D, Wang S, Zhao J. RST invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes. IEEE TRANSACTIONS ON IMAGE PROCESSING : A PUBLICATION OF THE IEEE SIGNAL PROCESSING SOCIETY 2009; 18:1055-1068. [PMID: 19336302 DOI: 10.1109/tip.2009.2014807] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/27/2023]
Abstract
In this paper, a new rotation and scaling invariant image watermarking scheme is proposed based on rotation invariant feature and image normalization. A mathematical model is established to approximate the image based on the mixture generalized Gaussian distribution, which can facilitate the analysis of the watermarking processes. Using maximum a posteriori probability based image segmentation, the cover image is segmented into several homogeneous areas. Each region can be represented by a generalized Gaussian distribution, which is critical for the analysis of the watermarking processes mathematically. The rotation invariant features are extracted from the segmented areas and are selected as reference points. Sub-regions centered at the feature points are used for watermark embedding and extraction. Image normalization is applied to the sub-regions to achieve scaling invariance. Meanwhile, the watermark embedding and extraction schemes are analyzed mathematically based on the established mathematical model. The watermark embedding strength is adjusted adaptively using the noise visibility function and the probability of error is analyzed mathematically. The mathematical relationship between fidelity and robustness is established. The experimental results show the effectiveness and accuracy of the proposed scheme.
Collapse
Affiliation(s)
- Dong Zheng
- Advanced Video Systems, Communication Research Centre Canada, Ottawa, ON K2H 8S2 Canada.
| | | | | |
Collapse
|
26
|
|
27
|
Pramila A, Keskinarkaus A, Seppänen T. Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding. DIGITAL WATERMARKING 2008. [DOI: 10.1007/978-3-540-92238-4_22] [Citation(s) in RCA: 12] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/13/2022]
|
28
|
|
29
|
Lin CH, Chan DY, Su H, Hsieh WS. Histogram-oriented watermarking algorithm: colour image watermarking scheme robust against geometric attacks and signal processing. ACTA ACUST UNITED AC 2006. [DOI: 10.1049/ip-vis:20050107] [Citation(s) in RCA: 31] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
|
30
|
Dong P, Brankov JG, Galatsanos NP, Yang Y, Davoine F. Digital watermarking robust to geometric distortions. IEEE TRANSACTIONS ON IMAGE PROCESSING : A PUBLICATION OF THE IEEE SIGNAL PROCESSING SOCIETY 2005; 14:2140-50. [PMID: 16370466 DOI: 10.1109/tip.2005.857263] [Citation(s) in RCA: 12] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/05/2023]
Abstract
In this paper, we present two watermarking approaches that are robust to geometric distortions. The first approach is based on image normalization, in which both watermark embedding and extraction are carried out with respect to an image normalized to meet a set of predefined moment criteria. We propose a new normalization procedure, which is invariant to affine transform attacks. The resulting watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. The second approach is based on a watermark resynchronization scheme aimed to alleviate the effects of random bending attacks. In this scheme, a deformable mesh is used to correct the distortion caused by the attack. The watermark is then extracted from the corrected image. In contrast to the first scheme, the latter is suitable for private watermarking applications, where the original image is necessary for watermark detection. In both schemes, we employ a direct-sequence code division multiple access approach to embed a multibit watermark in the discrete cosine transform domain of the image. Numerical experiments demonstrate that the proposed watermarking schemes are robust to a wide range of geometric attacks.
Collapse
Affiliation(s)
- Ping Dong
- Department of Electrical and Computer ENgineering, Illinois Institute of Technology, Chicago, IL 60616, USA
| | | | | | | | | |
Collapse
|
31
|
Chen S, Leung H. Ergodic chaotic parameter modulation with application to digital image watermarking. IEEE TRANSACTIONS ON IMAGE PROCESSING : A PUBLICATION OF THE IEEE SIGNAL PROCESSING SOCIETY 2005; 14:1590-602. [PMID: 16238064 DOI: 10.1109/tip.2005.854475] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/04/2023]
Abstract
This paper presents a novel technique for image watermarking based on chaos theory. Chaotic parameter modulation (CPM) is employed to modulate the copyright information into the bifurcating parameter of a chaotic system. The system output is a wideband signal and is used as a watermark to be inserted into the host image. In the detection, a novel method based on the ergodic property of chaotic signal is developed to demodulate the embedded copyright information. Compared to previous works on blind watermarking, the proposed technique can effectively remove the interference from the host image and, thus, improve the detection performance dramatically. Simulation results show that the ergodic CPM approach is effective for image watermarking in terms of noise performance, robustness against attacks, and payload. In addition, its implementation is very simple and the computation speed is fast. Compared to holographic transform domain method and the conventional spread spectrum watermarking scheme, the proposed technique is shown to be superior.
Collapse
Affiliation(s)
- Siyue Chen
- Department of Electrical and Computer Engineering, University of Calgary, Calgary, AB T2N 1N4 Canada.
| | | |
Collapse
|
32
|
|
33
|
|