Skip to main content

Robust Zero Watermarking for Still and Similar Images Using a Learning Based Contour Detection

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 427))

Abstract

Digital watermarking is an efficacious technique to protect the copyright and ownership of digital information. Traditional image watermarking algorithms embed a logo in the image that reduces its visual quality. A new approach in watermarking called zero watermarking doesn’t need to embed a logo in the image. In this algorithm we find a feature from the main image and combine it with a logo to obtain a key. This key is securely kept by a trusted authority. In this paper we show that we can increase the robustness of digital zero watermarking by a new counter detection method in comparison to Canny Edge detection and morphological dilatation that is mostly used by related works. Experimental results demonstrate that our proposed scheme is robust against common geometric and non-geometric attacks including blurring, JPEG compression, noise addition, Sharpening, scaling, rotation, and cropping. The main advantage of the proposed method is its ability to distinguishable key for images taken from the same scene with small angular rotation and minor displacement.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Shakeri, M., Jamzad, M.: A robust zero-watermarking scheme using Canny edge detector. Int. J. Electron. Secur. Digit. Forensics 5(1), 25–44 (2013)

    Article  Google Scholar 

  2. Arbelaez, P., Maire, M., Fowlkes, C., Malik, J.: Contour detection and hierarchical image segmentation. IEEE TPAMI 33(5), 898–916 (2011)

    Article  Google Scholar 

  3. Shapiro, L.G., Stockman, G.C.: Computer Vision, Prentice Hall (2001)

    Google Scholar 

  4. Martin, D., Fowlkes, C., Malik, J.: Learning to detect natural image boundaries using local brightness, color and texture cues. PAMI 26(5), 530–549 (2004)

    Article  Google Scholar 

  5. Savitzky, A., Golay, M.J.E.: Smoothing and differentiation of data by simplified least squares procedures. Anal. Chem. 36(8), 1627–1639 (1964)

    Article  Google Scholar 

  6. Chen, T.H., Horng, G., Lee, W.B.: A publicly verifiable copyright proving scheme resistant to malicious attacks. IEEE Trans. Ind. Electron. 52(1), 327–334 (2005)

    Article  Google Scholar 

  7. Abdel-Wahab, M.A., Selim, H., Sayed, U.: A novel robust watermarking scheme for copyright-proving. In: The 2009 International Conference on Computer Engineering and Systems, ICCES 2009, art. no. 5383216, pp. 482–486 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mansour Jamzad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Ehsaee, S., Jamzad, M. (2014). Robust Zero Watermarking for Still and Similar Images Using a Learning Based Contour Detection. In: Movaghar, A., Jamzad, M., Asadi, H. (eds) Artificial Intelligence and Signal Processing. AISP 2013. Communications in Computer and Information Science, vol 427. Springer, Cham. https://doi.org/10.1007/978-3-319-10849-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10849-0_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10848-3

  • Online ISBN: 978-3-319-10849-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics