Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1877972.1877979acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

Semantic object watermark re-synchronization based on skeleton vertex corresponds

Published: 29 October 2010 Publication History

Abstract

Plain rotation, scaling, and/or translation of an image can lead to loss of watermark synchronization and thus authentication failure. The block based approaches in particular are sensitive to geometric distortions due to the need for repositioning the block's rectangular grid. In this paper, we propose a novel block based approach for watermarking image objects in a way that is invariant to RST distortions. With the term "image object" we refer to semantically contiguous parts of images that have a specific contour boundary. The proposed approach is based on shape information since the watermark is embedded in image blocks, the location and orientation of which is defined by Eulerian tours that are appropriately arranged in layers, around the object's skeleton. The skeleton of the object (MAT transform) is defined by the shape of its boundary and not only is invariant to RST transformations but is also robust to cropping, clipping and other common deformation attacks. Results on the Caltech database are reported, showing the advantages of the proposed scheme

References

[1]
J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, San Mateo, Morgan Kaufmann, 2001.
[2]
N. Bi, Q. Sun, D. Huang, Z. Yang and J. Huang, "Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition," IEEE Transactions on Image Processing, Vol. 16, No. 8, August 2007.
[3]
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon "Secure Spread Spectrum Watermarking for Multimedia" in IEEE Trans. on Image Processing, Vol. 6, No. 12, 1997.
[4]
M. Alghoniemy and A. H. Tewfik, "Geometric Invariance in Image Watermarking" in IEEE Transactions on Image Processing, Vol. 13, No.2, February 2004.
[5]
P. Dong, J. Brankov, N. Galatsanos, and Y. Yang, "Geometric robust watermarking based on a new mesh model correction approach,"IEEE Int. Conf. on Image Processing ICIP, 2002.
[6]
S. Kay and E. Izquierdo, "Robust content based image watermarking," in WIAMIS 2001 - Workshop on Image Analysis for Multimedia Interactive Services, (Tampere, Finland), 16--17 May 2001.
[7]
J. Lichtenauer, I. Setyawan, T. Kalker, and R. Lagendijk, "Exhaustive geometrical search and false positive watermark detection probability," in SPIE Electronic Imaging 2002, Security and Watermarking of Multimedia Contents V, Jan 2003.
[8]
S. Baudry, P. Nguyen, and H. Maître, "Estimation of geometric distortions in digital watermarking," In IEEE- ICIP 2002.
[9]
D. Delannay and B. Macq, "2-D Periodic Patterns for Image Watermarking," Advanced Sciences and Technologies for Security Applications, Springer, Vol. 1, pp. 297--318, 2005.
[10]
M. Alghoniemy and A. H. Tewfik, "Progressive quantized projection watermarking scheme," Proc. of the 7th ACM International Multimedia Conference, pp. 295--298, Nov. 1999.
[11]
J. Wang, G. Liu, Y. Dai, J. Sun, Z. Wang and S. Lian, "Locally optimum detection for Barni's multiplicative watermarking in DWT domain" Signal Processing, v.88 n.1, p.117--130, Jan.2008.
[12]
W. Lu, H. Lu aand F.-L. Chung, "Feature based watermarking using watermark template match," Applied Mathematics and Computation, Elsevier, Vol. 177, p.p. 377--386, 2006.
[13]
C. Serdean, M. Ambroze, M. Tomlinson, and G. Wade, "Dwt based video watermarking for copyright protection invariant to geometrical attacks," in Int. Symposium on Communication Systems, Networks and Digital Signal Processing, July 2002.
[14]
F. Deguillaume, S. Voloshynovskiy, and T. Pun, "A method for the estimation and recovering from general affine transforms in digital watermarking applications," in SPIE Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, (San Jose), February 2002.
[15]
J. J. K. O. Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking," Signal Processing, p. 303--318, May 1998.
[16]
B.-S. Kim, J.-G. Choi and K.-H. Park, "RST-Resistant Image Watermarking Using Invariant Centroid and Reordered Fourier-Mellin Transform," Lecture Notes in Computer Science, Springer, Vol. 2939, p.p. 370--381, 2004.
[17]
C.-Y. Lin, "Public watermarking surviving general scaling and cropping: An application for print-and-scan process," Multimedia and Security Workshop at ACM Multimedia 99, (Orlando, FL, USA), Oct. 1999.
[18]
H. Liu and M. Steinebach, "Non-Ubiquitous Watermarking for Image Authentication by Region of Interest Masking," in Proceedings of the Picture Coding Symposium, Portugal, 2007.
[19]
K. Zebbiche and F. Khelifi, "Region-Based Watermarking of Biometric Images: Case Study in Fingerprint Images," Int. Journal of Digital Multimedia Broadcasting, 2008.
[20]
X. Guo, T.-G Zhuang, "A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data," Journal of Digital Imaging, Springer, vol. 22(1), pp. 53--64, Feb 2009.
[21]
CY. Lin, M. Wu, JA. Bloom, IJ. Cox, ML. Miller, YM. Lui "Rotation, scale, and translation resilient watermarking for images", IEEE Transaction on Image Processing 2001;10(5):767--82.
[22]
J. Viega, "Practical Random Number Generation in Software", in Proc. 19th Annual Computer Security Applications Conference, Dec. 2003.
[23]
T. Sebastian P Klein, and B. Kimia, "Recognition of Shapes by Editing their Shock Graphs", IEEE Pattern Analysis and Machine Intelligent, vol. 26, May 2004, pp. 551--57
[24]
R.L.Ogniewicz, "Discrete Voronoi Skeletons", 1992, Swiss Federal Institute of Technology, Zurich
[25]
V. Kolmogorov, and R.Zabih, "What energy functions can be minimizedvia graph cuts?", IEEE Transactions on Pattern Analysis and Machine Intelligence,147--159, 2004
[26]
M.Kass, A. Witkin, and D. Terzopoulos, "Snakes: Active contour models" International journal of computer vision, vol.1,n.4 321--331, 1988, Springer

Cited By

View all
  • (2010)Second ACM international workshop on multimedia in forensics, security and intelligence (MiFor 2010)Proceedings of the 18th ACM international conference on Multimedia10.1145/1873951.1874348(1741-1742)Online publication date: 25-Oct-2010

Index Terms

  1. Semantic object watermark re-synchronization based on skeleton vertex corresponds

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MiFor '10: Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
    October 2010
    134 pages
    ISBN:9781450301572
    DOI:10.1145/1877972
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 October 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. MAT
    2. eulerian tour
    3. object based watermarking
    4. skeleton

    Qualifiers

    • Research-article

    Conference

    MM '10
    Sponsor:
    MM '10: ACM Multimedia Conference
    October 29, 2010
    Firenze, Italy

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 06 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2010)Second ACM international workshop on multimedia in forensics, security and intelligence (MiFor 2010)Proceedings of the 18th ACM international conference on Multimedia10.1145/1873951.1874348(1741-1742)Online publication date: 25-Oct-2010

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media