Skip to main content
Log in

Affine invariant image watermarking scheme based on ASIFT and Delaunay tessellation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Watermarking algorithms that resist geometric combination attacks is currently a trend of research in this field. This paper proposed a geometrically invariant watermarking scheme based on the feature points of resistance to affine transformation. The scheme used Affine Scale Invariant Feature Transform (ASIFT) to detect the feature points of the carrier image and filtrated the established feature points group depending on anti-affine properties. The obtained feature points set obtained better robustness against multiple attacks. As for robustness, we utilized the feature points set to construct the Delaunay tessellation and embedded the watermark information in the histogram of each triangle. Because of the stability of Delaunay tessellation and the basic characteristics of affine transformation, the geometric robustness of the proposed scheme achieved a good effect as was verified in experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Jia XL, Yang Z, Qi YL, Shao LP (2016) The anti-geometric attack digital watermarking algorithm based on image normalization of local information. In: Information technology, networking, electronic and automation control conference. IEEE, pp 1120–1124

  2. Kim BS, Choi JG, Park KH (2003) RST-resistant image watermarking using invariant centroid and reordered Fourier-Mellin transform. Int Workshop Digit Watermarking LNCS 2939:370–381

    Article  Google Scholar 

  3. Kuo LH, Gu MH, Young DL, Lin CY (2013) Domain type kernel-based meshless methods for solving wave equations. Comput Mater Continua 33(3):213–228

    Google Scholar 

  4. Liu CS (2008) A time-marching algorithm for solving non-linear obstacle problems with the aid of an ncp-function. Comput Mater Continua 8(2):53–65

    Google Scholar 

  5. Lou OJ, Tang ST, Li SH (2015) Watermarking scheme resilient to geometrical attacks base normalized feature area. Adv Mater Res 1061-1062:1118–1123

    Article  Google Scholar 

  6. Luo XY, Song XF, Li XL, Zhang WM, Lu JC, Yang CF, et al. (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13557– 13583

    Article  Google Scholar 

  7. Lu W, Lu HT, Chung FL (2010) Feature based robust watermarking using image normalization. Comput Electr Eng 36(1):2–18

    Article  Google Scholar 

  8. Lyu WL, Chang CC, Nguyen TS, Lin CC (2014) Image watermarking scheme based on scale-invariant feature transform. Ksii Trans Int Inf Syst 8(10):3591–3606

    Google Scholar 

  9. Ma B, Shi YQ (2017) A reversible data hiding scheme based on code division multiplexing. IEEE Trans Inf Forens Secur 11(9):1914–1927

    Article  Google Scholar 

  10. Ma YY, Luo XY, Li XL, Bao ZK, Zhang Y (2018) Selection of rich model steganalysis features based on decision rough set α-positive region reduction. IEEE Transactions on Circuits Systems for Video Technology, https://doi.org/10.1109/TCSVT.2018.2799243

  11. Nasir I, Khelifi F, Jiang J, Ipson S (2012) Robust image watermarking via geometrically invariant feature points and image normalisation. Image Process Iet 6(4):354–363

    Article  MathSciNet  Google Scholar 

  12. Pun CM, Yuan XC (2015) Histogram modification based image watermarking resistant to geometric distortions. Multimed Tools Appl 74(18):7821–7842

    Article  Google Scholar 

  13. Shao ZH, Shang YY, Zhang Y, Liu XL, Guo GD (2016) Robust watermarking using orthogonal fourier-mellin moments and chaotic map for double images. Signal Process 120:522–531

    Article  Google Scholar 

  14. Su PC, Chang YC, Wu CY (2013) Geometrically resilient digital image watermarking by using interest point extraction and extended pilot signals. IEEE Trans Inf Forens Secur 8(12):1897– 1908

    Article  Google Scholar 

  15. Sun J, Lan S (2010) Geometrical attack robust spatial digital watermarking based on improved SIFT. International conference on innovative computing and communication and 2010 Asia-Pacific conference on information technology and ocean engineering. IEEE Comput Soc 47(9):98–101

    Google Scholar 

  16. Thanh TM, Tanaka K, Dung LH, Tai NT, Hai NN (2017) Performance analysis of robust watermarking using linear and nonlinear feature matching. Multimed Tools Appl 77(9):1–20

    Google Scholar 

  17. Urvoy M, Goudia D, Autrusseau F (2014) Perceptual DFT watermarking with improved detection and robustness to geometrical distortions. IEEE Trans Inf Forens Secur 9(7):1108–1119

    Article  Google Scholar 

  18. Wang XY, Liu YN, Li S, Yang HY, Niu PP (2016) Robust image watermarking approach using polar harmonic transforms based geometric correction. Neurocomputing 174(PB):627–642

    Article  Google Scholar 

  19. Wang JW, Li T, Shi YQ, Lian SG, Ye JY (2017) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimed Tools Appl 76(22):23721–23737

    Article  Google Scholar 

  20. Yang CY (2017) Robust high-capacity watermarking scheme based on Euclidean norms and quick coefficient alignment. Multimed Tools Appl 76(1):1455–1477

    Article  Google Scholar 

  21. Yang CF, Luo XY, Lu JC, Liu FL (2018) Extracting hidden messages of MLSB steganography based on optimal stego subset. Science China Information Sciences, https://doi.org/10.1007/s11432-017-9328-2

  22. Ye X, Chen X, Deng M, Wang Y (2015) A SIFT-based DWT-SVD blind watermark method against geometrical attacks. In: International congress on image and signal processing. IEEE, pp 323– 329

  23. Yu G, Morel JM (2011) Asift: an algorithm for fully affine invariant comparison. Image Process Line 1:2105–1232

    Google Scholar 

  24. Yuan WG, Ling HF, Lu ZD, Zou FH, Yu YW (2007) Image content-based watermarking resistant against geometrical distortions. Int Conf Signal Process IEEE 4:2632–2635

    Google Scholar 

  25. Zhang XJ, Cao XC, Li JJ (2013) Geometric attack resistant image watermarking based on MSER. Front Comput Sci 7(1):145–156

    Article  MathSciNet  Google Scholar 

  26. Zhang Y, Qin C, Zhang WM, Liu FL, Luo XY (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99–111

    Article  Google Scholar 

  27. Zhao Y, Ni RR, Zhu ZF (2012) RST transforms resistant image watermarking based on centroid and sector-shaped partition. Sci Chin Inf Sci 55(3):650–662

    Article  MathSciNet  Google Scholar 

  28. Zheng D, Zhao J (2007) A rotation invariant feature and image normalization based image watermarking algorithm. In: IEEE international conference on multimedia and expo, pp 2098–2101

Download references

Acknowledgements

This work was supported in part by the National Nature Science Foundation of China (Grant No. U1636219, U1736119, 61572052, 61772549, U1736214, 61401512, and 61601517), the National Key R&D Program of China (Grant No. 2016YFB0801303 and 2016QY 01W0105), Plan for Scientific Innovation Talent of Henan Province (Grant No. 2018JR0018) and the Key Technologies R&D Program of Henan Province (Grant No. 162102210032)).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daofu Gong.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Feng, L., Gong, D., Liu, F. et al. Affine invariant image watermarking scheme based on ASIFT and Delaunay tessellation. Multimed Tools Appl 78, 8133–8149 (2019). https://doi.org/10.1007/s11042-018-6717-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6717-7

Keywords

Navigation