CFP last date
22 April 2024
Reseach Article

Digital Image Watermarking Against Desynchronization Attacks

Published on August 2011 by M Selin
International Conference on Information Systems and Technology
Foundation of Computer Science USA
ICIST - Number 1
August 2011
Authors: M Selin
e2e66ab9-8ff5-48c7-a8e1-fc4d227b7764

M Selin . Digital Image Watermarking Against Desynchronization Attacks. International Conference on Information Systems and Technology. ICIST, 1 (August 2011), 1-6.

@article{
author = { M Selin },
title = { Digital Image Watermarking Against Desynchronization Attacks },
journal = { International Conference on Information Systems and Technology },
issue_date = { August 2011 },
volume = { ICIST },
number = { 1 },
month = { August },
year = { 2011 },
issn = 0975-8887,
pages = { 1-6 },
numpages = 6,
url = { /proceedings/icist/number1/3262-icist017/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Information Systems and Technology
%A M Selin
%T Digital Image Watermarking Against Desynchronization Attacks
%J International Conference on Information Systems and Technology
%@ 0975-8887
%V ICIST
%N 1
%P 1-6
%D 2011
%I International Journal of Computer Applications
Abstract

Fast and massive dissemination of image data across the Internet imposes great challenges of protecting images against illegal access and unauthorized reproduction. Image watermarking provides a powerful solution for intellectual protection. This paper presents a new feature-based image watermarking scheme which is robust to desynchronization attacks. The Harris –Laplace detector is used to extract the robust feature points, which can survive various signal processing and affine transformation. A local characteristic region (LCR), is constructed based on the scale-space representation of an image is considered for watermarking. At each LCR, the digital watermark is embedded, by modulating the magnitudes of Discrete Cosine Transform coefficients. The performance of watermark detection is computed based on the correlation coefficient. The correlation coefficient is computed between the embedded watermark bits and the detected bits. The results show that the proposed scheme is invisible and robust against various attacks which include common signals processing and desynchronization attacks.

References
  1. Xiangyang Xiangyang Wang, Jun Wu, and Panpan Niu,” A New Digital Image Watermarking Algorithm Resilient to Desynchronization Attacks”, IEEE Trans. On Information Forensics and Security, vol. 2, no. 4, DEC 2007.
  2. Xiang-Yang Wang, Jun Wu,” A Feature-based Robust Digital Image Watermarking Against Desynchronization Attacks,” International Journal of Automation and Computing 04(4), October 2007.
  3. Xiang-yangWang, Li-min Hou and Hong-ying Yang,”A feature-based image watermarking scheme robust to local geometrical Distortions, ” J. Opt. A: Pure Appl. Opt. 11 (2009).
  4. Shiyan Hu,” Geometric-Invariant Image Watermarking by Key-Dependent Triangulation,” Informatica 32 (2008) ,pp. 169-181..
  5. J. Ruanaidh and T. Pun, “Rotation scale and translation invariant digital image watermarking,” Signal Process., vol. 66, no. 3, pp. 303–317,1998.
  6. P. Dong, J. G. Brankov, N. P. Galatsanos, Y. Yang, and F. Davoine, “Digital watermarking robust to geometric distortions,” IEEE Trans .Image Process., vol. 14, no. 12, pp. 2140–2150, Dec. 2005.
  7. H. S. Kim and H. K. Lee, “Invariant image watermarking using Zernike moments,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp.766–775, Aug. 2003.
  8. S. Pereira and T. Pun, “Robust template matching for affine resistant image watermarks,” IEEE Trans. Image Process., vol. 9, no. 6, pp.1123–1129, Jun. 2000.
  9. X. Kang, J. Huang, Y. Q. Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp.776–786, Aug. 2003.
  10. M. Kutter, S. K. Bhattacharjee, and T. Ebrahimi, “Toward second generation watermarking schemes,” in Proc. IEEE Int. Conf. Image Process., Kobe, Japan, 1999, vol. 1, pp. 320–323.
  11. P. Bas, J. M. Chassery, and B. Macq, “Geometrically invariant watermarking using feature points,” IEEE Trans. Signal Process., vol. 11,no. 9, pp. 1014–1028, Nov. 2002.
  12. C. W. Tang and H. M. Hang, “A feature-based robust digital image watermarking scheme,” IEEE Trans. Signal Process., vol. 51, no. 4,pp. 950–958, Apr. 2003.
  13. B. S. Manjunath, C. Shekhar, and R. Chellappa, “A new approach to image feature detection with applications,” Pattern Recognition., vol. 4,pp. 627–640, 1996.
  14. C. Harris and M. Stephen, “A combined corner and edge detector,” in Proc. 4th Alvey Vision Conf., 1988, pp. 147–151.
  15. H.-Y. Lee et al., “Evaluation of feature extraction techniques for robust watermarking,” in Proc. 4th Int. Workshop on Digital Watermarking ,Siena, Italy, Sep. 15–17, 2005, vol. 3710, Lecture Notes Comput. Sci.,pp. 418–431.
  16. C. Schmid, R. Mohr, and C. Bauckhage, “Evaluation of interest point detectors,” Int. J. Comput. Vis., vol. 37, no. 2, pp. 151–172, 200
  17. K. Mikolajczyk and C. Schmid, “Scale & affine invariant interest point detectors,” Int. J. Comput. Vis., vol. 60, no. 1, pp. 63–86, 2004.
  18. T. Lindeberg, “Features detection with automatic scale selection,” Int.J. Comput. Vis., vol. 30, no. 2, pp. 79–116, 1998.
  19. Li-Li, M. Zhang, and Z. Pan, “Image watermarking algorithm resilient to geometrical transform,” J. Zhe-Jiang Univ. (Eng. Sci.), vol. 38, no.2, pp. 141–144, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Image watermarking desynchronization attacks feature points local characteristic region (LCR)