A Normalization-based Robust Watermarking Scheme Using Zernike Moments
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
A Normalization-based Robust Watermarking Scheme Using Zernike Moments

Authors: Say Wei Foo, Qi Dong

Abstract:

Digital watermarking has become an important technique for copyright protection but its robustness against attacks remains a major problem. In this paper, we propose a normalizationbased robust image watermarking scheme. In the proposed scheme, original host image is first normalized to a standard form. Zernike transform is then applied to the normalized image to calculate Zernike moments. Dither modulation is adopted to quantize the magnitudes of Zernike moments according to the watermark bit stream. The watermark extracting method is a blind method. Security analysis and false alarm analysis are then performed. The quality degradation of watermarked image caused by the embedded watermark is visually transparent. Experimental results show that the proposed scheme has very high robustness against various image processing operations and geometric attacks.

Keywords: Image watermarking, Image normalization, Zernike moments, Robustness.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1061475

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1715

References:


[1] J. J. K. O'Ruanaidh, W.J. Downling, and F.M. Boland, "Watermarking digital images for copyright protection," in Proc. Inst. Elect. Eng., vol. 143, no. 4, pp. 250-256, Aug. 1996.
[2] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon,"Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
[3] Ning Bi, Qiyu Sun, Daren Huang, Zhihua Yang, Jiwu Huang,"Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition," IEEE Transactions on Image Processing, Volume 16, Issue 8, Aug. 2007 Page(s):1956 - 1966
[4] Ching-Yung Lin and Shih-Fu Chang, A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 11 No. 2, 2001, pp. 129-138
[5] P.S.L.M. Barreto, H.Y. Kim, andV. Rijmen,"Toward secure public- key blockwise fragile authentication watermarking," in Proc. Inst. Elect. Eng., vol. 149, no. 2, pp. 57-62, Apr. 2002.
[6] N. Singhal, Y.Y. Lee, and S.U. Lee, "Robust image watermarking using local Zernike moments," Science Direct. Image Process. vol. 11, no. 6, pp. 585-595, Jun. 2008.
[7] Xiang-yang Wang, Li-min Hou and Jun Hu "A feature-based robust digital image watermarking scheme," IEEE Transactions on Image Processing, Volume 15, Issue 10, Oct. 2007 Page(s):3189 - 3200.
[8] Ching-Yung Lin and Shi-Fu Chang,"Semi-fragile watermarking for authenticating JPEG visual content", SPIE, Security and Watermarking of Multimedia Contents, pp.140-151, 2000.
[9] Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun," Semi- fragile image watermarking method based on index constrained vector quantization," Electronics Letters, Volume 39, Issue 1, 9 Jan 2003 Page(s):35 - 36.
[10]C.S. Lu and H.Y.M. Liao,"Multipurpose watermarking for image authentication and protection," IEEE Trans. Image Process., vol. 10, pp. 1579-1592, Oct. 2001.
[11] Fan Gu, Zhe-Ming Lu, Jeng-Shyang Pan,"Invariant Watermarking Using Zernike Moments," IEEE International Symposium on Circuits and Systems, 2005. Vol. 5, Page(s):4417 - 4420.
[12] Zhe-Ming Lu, Dian-Guo Xu, Sheng-He Sun, "A Novel Watermarking Scheme based on SVD and Zernike Moments," IEEE Transactions on Image Processing, Volume 14, Issue 6, June 2005 Page(s):822 - 831
[13] Z. M. Lu and S. H. Sun, "Digital image watermarking technique based on vector quantization," Electron. Lett., vol. 36, no. 4, pp. 303-305, Feb. 2000.
[14] Z. M. Lu, J. S. Pan, and S. H. Sun, "VQ-based digital image watermarking method," Electron. Lett., vol. 36, no. 14, pp. 1201-1202, Jul. 2000.
[15] Z. M. Lu, C. H. Liu, and S. H. Sun, "Digital image watermarking technique based on block truncation coding with vector quantization," Chinese J. Electron., vol. 11, no. 2, pp. 152-157, Apr. 2002.
[16] E.-H. Yang and G. Wu, "Joint compression and blind watermarking: A case study in the JPEG-compatible scenario," Proc. of the 43th Allerton Conference on Communications, Control, and Computing, September 28-30, 2005.
[17] Wong, P.H.W. and Au, O.C., "A blind watermarking technique in JPEG compressed domain using image normalization," Proceedings of International Conference on Image Processing. Vol. 3, Issue 24-28, pp. 497 - 500, June 2002.
[18] R. Liu and T. Tan, "A new normalization-based image watermarking method," In Proc. of the 4th Asian Conference on Computer Vision, volume I, pages 63--67, January 2000.
[19] V. Gorodetski, L.Popyack, V. Samoilov, and V.Skormi, "SVD-based Approach to Transparent Embedding Data into Digital Images," in Proc. Int. Workshop, MMM-ACNS, St. Petersburg, Russia, 2001, pp. 263-274.
[20] K.L. Chung, C.H. Shen, L.C. Chang, "A nocel SVD- and VQ-based image hiding scheme" Pattern Recognition Letter, pp 1051-1058, 2001.
[21] D.V.S. Chandra, "Digital image watermarking using singular value decomposition," in Proc. of 45th IEEE Midwest Symposium on Circuits and System, Tulsa, OK, 2002, pp. 264-267.
[22] R. Liu and T. Tan, "An SVD-Based Watermarking Scheme for Protecting Rightful Ownership," IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121-128, March 2006.
[23] S. Xiang, Wu, J. Huang, D. Huang, and Y. Q. Shi. Efficiently Self- synchronized audio watermarking for assured audio data transmission. IEEE Trans. Broadcasting, 51(1):69-76, March 2005.
[24] B. Ko, R. Nishimura, and Y. Suzuki. Time-spread echo method for digital audio watermarking using PN sequences ICASSP, 2:2001-2004, 2002.
[25] C. C. Chang, C. C. Lin and Y. S. Hu, "An SVD oriented watermark embedding scheme with high qualities for the resorted images," International Journal of Innovative Computing, Information and Control, vol.3, no.3, pp.609-620, 2007.
[26] Xiao-Ping Zhang; Kan Li, "Comments on "An SVD-Based Watermarking Scheme for Protecting Rightful Ownership"," IEEE Transactions on Multimedia, Volume 7, Issue 3, June 2005 Page(s):593 - 594.
[27] A. Shnayderman, A. Gusev, and A. M. Eskicioglu, "An SVD-based Grayscale Image Quality Measure for Local and Global Assessment," IEEE Transactions on Image Processing, vol. 15, no. 2, pp. 422-429, Feb 2006.
[28] A. S. Lewis and G. Knowles, "Image Compression Using the 2-D Wavelet Transform," IEEE Transactions on Image Processing, vol. 1, no. 2, pp. 244-250, Apr 1992.