Skip to main content

Abstract

In this paper, we propose a digital watermarking scheme that is robust against geometric distortions. The proposed method uses image moment normalization and a correlation peak position modulation (CPPM) to recover geometric distortions. This mechanism is invariant to affine transform attacks and suitable for public watermarking applications, where the original image is not available for watermark extraction. In addition, CPPM ensures that there is sufficient capacity to hide specific information. We verify the robustness of our approach to rotation, scaling, and Gaussian noise attacks. The watermark can be detected with zero BER, because disadvantages disappear when CPPM is combined with image moment normalization—only the advantages of the two methods remain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87, 1079–1107 (1999)

    Article  Google Scholar 

  2. Kim, J., Kim, N., Lee, D., Park, S., Lee, S.: Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents. Signal Processing: Image Communication 25, 559–576 (2010)

    Article  Google Scholar 

  3. Li, D., Kim, J.: Secure Image Forensic Marking Algorithm using 2D Barcode and Off-axis Hologram in DWT-DFRNT Domain. Applied Mathematics & Information Sciences (AMIS) 6, 513–520 (2012)

    Google Scholar 

  4. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on Copyright Marking Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, p. 218. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  5. Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Electronic Imaging 1999, Security and Watermarking of Multimedia Contents, San Jose, CA, vol. 3657 (January 1999)

    Google Scholar 

  6. Cox, I.J., Linnartz, J.P.M.G.: Public watermarks and resistance to tampering. In: IEEE International Conference on Image Processing, vol. 3 (1997)

    Google Scholar 

  7. Ruanaidh, J.O., Pun, T.: Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing 66(III), 303–317 (1998)

    Article  MATH  Google Scholar 

  8. Lin, C.Y., Wu, M., Bloom, J.A., Cox, I.J., Miller, M., Lui, Y.M.: Rotation, scale and translation resilient public watermarking for images. IEEE Trans. on Image Processing 9(6), 767–782 (2001)

    Article  Google Scholar 

  9. Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarks. IEEE Trans. on Image Processing 9(6), 1123–1129 (2000)

    Article  Google Scholar 

  10. Dong, P., Brankov, J.G., Galatsanos, N.P., Yang, Y., Davoine, F.: Digital Watermarking Robust to Geometric Distortions. IEEE Transactions on Image Processing 14(12), 2140–2150 (2005)

    Article  Google Scholar 

  11. Lu, C.-S.: Towards robust image watermarking: combining content-dependent key, moment normalization, and side-informed embedding. Signal Processing: Image Communication 20, 129–150 (2005)

    Article  Google Scholar 

  12. Cox, I.J., Miler, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann (2001)

    Google Scholar 

  13. Nah, J., Kim, J., Kim, J.: Video Forensic Marking Algorithm Using Peak Position Modulation. Applied Mathematics & Information Sciences (AMIS) 6(3S) (to be published, 2012)

    Google Scholar 

  14. Nah, J., Kim, J., Kim, J.: Image Watermarking for Identification Forgery Prevention. Journal of the Korea Contents Association 11(12) (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nah, J., Kim, J. (2012). Digital Watermarking Robust to Geometric Distortions. In: Kim, Th., Mohammed, S., Ramos, C., Abawajy, J., Kang, BH., Ślęzak, D. (eds) Computer Applications for Web, Human Computer Interaction, Signal and Image Processing, and Pattern Recognition. ICHCI WSE SIP 2012 2012 2012. Communications in Computer and Information Science, vol 342. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35270-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35270-6_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35269-0

  • Online ISBN: 978-3-642-35270-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics