A Normalization-based Robust Watermarking Scheme Using Zernike Moments

Digital watermarking has become an important technique for copyright protection but its robustness against attacks remains a major problem. In this paper, we propose a normalizationbased robust image watermarking scheme. In the proposed scheme, original host image is first normalized to a standard form. Zernike transform is then applied to the normalized image to calculate Zernike moments. Dither modulation is adopted to quantize the magnitudes of Zernike moments according to the watermark bit stream. The watermark extracting method is a blind method. Security analysis and false alarm analysis are then performed. The quality degradation of watermarked image caused by the embedded watermark is visually transparent. Experimental results show that the proposed scheme has very high robustness against various image processing operations and geometric attacks.


Authors:



References:
[1] J. J. K. O'Ruanaidh, W.J. Downling, and F.M. Boland, "Watermarking
digital images for copyright protection," in Proc. Inst. Elect. Eng., vol.
143, no. 4, pp. 250-256, Aug. 1996.
[2] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon,"Secure spread
spectrum watermarking for multimedia," IEEE Trans. Image Process.,
vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
[3] Ning Bi, Qiyu Sun, Daren Huang, Zhihua Yang, Jiwu Huang,"Robust
Image Watermarking Based on Multiband Wavelets and Empirical
Mode Decomposition," IEEE Transactions on Image Processing,
Volume 16, Issue 8, Aug. 2007 Page(s):1956 - 1966
[4] Ching-Yung Lin and Shih-Fu Chang, A Robust Image Authentication
Method Distinguishing JPEG Compression from Malicious
Manipulation, IEEE Transactions on Circuits and Systems for Video
Technology, Vol. 11 No. 2, 2001, pp. 129-138
[5] P.S.L.M. Barreto, H.Y. Kim, andV. Rijmen,"Toward secure public-
key blockwise fragile authentication watermarking," in Proc. Inst. Elect.
Eng., vol. 149, no. 2, pp. 57-62, Apr. 2002.
[6] N. Singhal, Y.Y. Lee, and S.U. Lee, "Robust image watermarking
using local Zernike moments," Science Direct. Image Process. vol. 11,
no. 6, pp. 585-595, Jun. 2008.
[7] Xiang-yang Wang, Li-min Hou and Jun Hu "A feature-based robust
digital image watermarking scheme," IEEE Transactions on Image
Processing, Volume 15, Issue 10, Oct. 2007 Page(s):3189 - 3200.
[8] Ching-Yung Lin and Shi-Fu Chang,"Semi-fragile watermarking for
authenticating JPEG visual content", SPIE, Security and Watermarking
of Multimedia Contents, pp.140-151, 2000.
[9] Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun," Semi-
fragile image watermarking method based on index constrained vector
quantization," Electronics Letters, Volume 39, Issue 1, 9 Jan 2003
Page(s):35 - 36.
[10]C.S. Lu and H.Y.M. Liao,"Multipurpose watermarking for image
authentication and protection," IEEE Trans. Image Process., vol. 10, pp.
1579-1592, Oct. 2001.
[11] Fan Gu, Zhe-Ming Lu, Jeng-Shyang Pan,"Invariant Watermarking
Using Zernike Moments," IEEE International Symposium on Circuits
and Systems, 2005. Vol. 5, Page(s):4417 - 4420.
[12] Zhe-Ming Lu, Dian-Guo Xu, Sheng-He Sun, "A Novel Watermarking
Scheme based on SVD and Zernike Moments," IEEE Transactions on
Image Processing, Volume 14, Issue 6, June 2005 Page(s):822 - 831
[13] Z. M. Lu and S. H. Sun, "Digital image watermarking technique based
on vector quantization," Electron. Lett., vol. 36, no. 4, pp. 303-305, Feb.
2000.
[14] Z. M. Lu, J. S. Pan, and S. H. Sun, "VQ-based digital image
watermarking method," Electron. Lett., vol. 36, no. 14, pp. 1201-1202,
Jul. 2000.
[15] Z. M. Lu, C. H. Liu, and S. H. Sun, "Digital image watermarking
technique based on block truncation coding with vector quantization,"
Chinese J. Electron., vol. 11, no. 2, pp. 152-157, Apr. 2002.
[16] E.-H. Yang and G. Wu, "Joint compression and blind watermarking: A
case study in the JPEG-compatible scenario," Proc. of the 43th Allerton
Conference on Communications, Control, and Computing, September
28-30, 2005.
[17] Wong, P.H.W. and Au, O.C., "A blind watermarking technique in JPEG
compressed domain using image normalization," Proceedings of
International Conference on Image Processing. Vol. 3, Issue 24-28, pp.
497 - 500, June 2002.
[18] R. Liu and T. Tan, "A new normalization-based image watermarking
method," In Proc. of the 4th Asian Conference on Computer Vision,
volume I, pages 63--67, January 2000.
[19] V. Gorodetski, L.Popyack, V. Samoilov, and V.Skormi, "SVD-based
Approach to Transparent Embedding Data into Digital Images," in Proc.
Int. Workshop, MMM-ACNS, St. Petersburg, Russia, 2001, pp. 263-274.
[20] K.L. Chung, C.H. Shen, L.C. Chang, "A nocel SVD- and VQ-based
image hiding scheme" Pattern Recognition Letter, pp 1051-1058, 2001.
[21] D.V.S. Chandra, "Digital image watermarking using singular value
decomposition," in Proc. of 45th IEEE Midwest Symposium on Circuits
and System, Tulsa, OK, 2002, pp. 264-267.
[22] R. Liu and T. Tan, "An SVD-Based Watermarking Scheme for
Protecting Rightful Ownership," IEEE Transactions on Multimedia, vol.
4, no. 1, pp. 121-128, March 2006.
[23] S. Xiang, Wu, J. Huang, D. Huang, and Y. Q. Shi. Efficiently Self-
synchronized audio watermarking for assured audio data transmission.
IEEE Trans. Broadcasting, 51(1):69-76, March 2005.
[24] B. Ko, R. Nishimura, and Y. Suzuki. Time-spread echo method for
digital audio watermarking using PN sequences ICASSP, 2:2001-2004,
2002.
[25] C. C. Chang, C. C. Lin and Y. S. Hu, "An SVD oriented watermark
embedding scheme with high qualities for the resorted images,"
International Journal of Innovative Computing, Information and
Control, vol.3, no.3, pp.609-620, 2007.
[26] Xiao-Ping Zhang; Kan Li, "Comments on "An SVD-Based
Watermarking Scheme for Protecting Rightful Ownership"," IEEE
Transactions on Multimedia, Volume 7, Issue 3, June 2005 Page(s):593
- 594.
[27] A. Shnayderman, A. Gusev, and A. M. Eskicioglu, "An SVD-based
Grayscale Image Quality Measure for Local and Global Assessment,"
IEEE Transactions on Image Processing, vol. 15, no. 2, pp. 422-429,
Feb 2006.
[28] A. S. Lewis and G. Knowles, "Image Compression Using the 2-D
Wavelet Transform," IEEE Transactions on Image Processing, vol. 1,
no. 2, pp. 244-250, Apr 1992.