Advanced Search
Volume 26 Issue 9
Sep.  2004
Turn off MathJax
Article Contents
Liu Jiu-fen, Huang Da-ren, Huang Ji-wu. Survey on Watermarking Against Geometric Attack[J]. Journal of Electronics & Information Technology, 2004, 26(9): 1495-1503.
Citation: Liu Jiu-fen, Huang Da-ren, Huang Ji-wu. Survey on Watermarking Against Geometric Attack[J]. Journal of Electronics & Information Technology, 2004, 26(9): 1495-1503.

Survey on Watermarking Against Geometric Attack

  • Received Date: 2003-10-09
  • Rev Recd Date: 2004-04-05
  • Publish Date: 2004-09-19
  • Robustness is the key issue of digital watermarking technology. Up to now, various watermarking algorithms are proposed with much emphasis on the robustness. However, the robustness claimed in most of algorithms is only against common signal processing operations such as compression and signal filtering. It is now clear that even very small geometric distortions can prevent the detection of a watermark. In this paper the current methods against geometric attacks are analyzed and summarized, and some probable development directions of digital watermarking at next stage axe introduced which are the key issues to improve and design watermarking algorithms.
  • loading
  • Crave S, Yeo B L, Yeung M. Technical trials and legal tribulations. Communications of the ACM,1998, 41(7): 45-54. [2]Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking system. In Proc. 2nd Int. Workshop Information Hiding, Portland, OR, Apr. 14-17, 1998: 218-238. [3]Unzign. http:∥www.altern.org/watermark. [4]Cox I J, Linnartz J. Public watermarks and resistance tampering. In Proc of ICIP97, Washington,DC, 1997: 26-29. [5]Cox I J, Linnartz J. Some general methods for tampering with watermarks. IEEE J. on Selected Areas in Communications, 1998, 16(4): 587-593. [6]Brown L G. A survey of image registration techniques. ACM Computing Surveys, 1992, 24(4):325-376. [7]Thvenaz P, Ruttimann U E, Unser M. A pyramid approach to subpixel registration based on intensity. IEEE Trans. on Image Processing, 1998, 7(1): 27-41. [8]刘九芬,王振武,黄达人.抗几何攻击的小波变换域图像水印算法.浙江大学学报(工学版),2003,37(4):386-392. [9]Davoine F. Watermarking et rsistance aux deformation gomtriques. In Cinquiemes journes dtudes et dchanges sur la compression et la representation des signaux audiovisuals (CORESA99), Centre de Recherch et Dveloppement de France Tlcom (Cnet), EURECOM,Conseil Gnral des Alpes-Maritimes and Tlcom Valley, Sophia-Antipolis, France, Jun. 1999:14-15.[10]Johnson N F, Duric Z, Jajodia S. Recovery of watermarks form distorted images. In Proc. 3rd Int. Information Hiding Workshop, Dresden, Germany, 1999: 361-375. [11]Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted images. In Proc. SPIE Security and Watermarking of Multimedia Contents I, CA, USA,2000, Vol.3971: 74-81. [12]Kang X G, Huang J W, Shi Y Q. An image watermarking algorithm robust to geometric distortion.Lecture Notes in Computers Science: Proc. of IWDW 2002, Spinger-Verlag, 2002, Vol. 2613:212-213. [13]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法.电子学报,2001,29(2):168-171. [14]ORuanaidh J J K, Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing, 1998, 66(3): 303-317. [15]Wu M, Miller L M, Bloom J A, et al.. A Rotation, scale, and translation resilient public watermark. In Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing 1999(ICASSP99),Phoenix, AZ, 1999. http:∥www.assuredigit.com/tech_doc/more/Cox_Rotation_ scaling_translation_resilient_public_watermark. PDF.[16]Lin C Y, Wu M, Bloom J A, et al.. Rotation, scale, and translation resilient watermarking for images. IEEE Trans. on Image Processing, 2001, 10(5): 765-782. [17]Lin C Y. Public watermarking surviving general scaling and cropping: An application for printand-scan process. Multimedia and Security Workshop at ACM Multimedia 99, Orlando, FL,USA, Oct. 1999. http:∥citeseer.ist.psu.edu/lin99public.html [18]Solachidis V, Pitas I. Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP99), Phoenix, 1999, Vol. 6:3469-3472. [19]Licks V, Jordan R. On digital image watermarking robust to geometric transformations. IEEE Int. Conference on Image Processing, Vancounver, Canada, 2000: 690-693. [20]Lin C Y, Chang S F. Distortion modeling and invariant extraction for digital image print-and-scan process. International Symposium on Multimedia Information Processing (ISMIP 99), Taipei,Taiwan, Dec. 1999. http:∥www.ctr.columbia.edu/papers_advent/99/cylin-modelscan.pdf [21]Hayes M H. The reconstruction of a multidimensional sequence from the phase or magnitude of the FFT. IEEE Trans. on Acoustics, Speech and Signal Processing, 1992, (4): 140-154. [22]Fleet D J, Heger D J. Embedding invisible information in color images. In Proc. IEEE Int. Conf.on Image Processing (ICIP-97), Santa Barbara, October 1997, 1: 532-535. [23]Gruhl D, Bender W. Affine invariance. http:∥nif. www.media.mit.edu/DataHiding/affine/affine.html, 1995. [24]Kutter M. Watermarking resistance to translation, rotation, and scaling. In Proc. SPIE Multimedia Systems Applications, 1998, Vol. 3528: 423-431. [25]Honsinger C, Rabbani M. Data embedding using phase dispersion. In PICS 2000: Image Quality,Image Capture, Systems Conf., 2000, 3: 264-268. [26]Honsinger C W, Daly S J. Method for detecting rotation and magnification in image. U.S.Patent, 5835639, 1998.[27]Voloshynovskiy S, Deguillaume F, Pun T. Content adaptive watermarking based on a stochastic multiresolution image modeling. In EUSIPCO 2000, Tampere, Finland, September, 2000.http:∥citeseer.ist.psu.edu/380994.html [28]Pereira S, ORuanaidh J J K, Pun T. Secure robust digital watermarking using the lapped orthogonal transform. In IST/SPIE Electronic Image99, Session: Security and Watermarking of Multimedia Contents, San Jose, CA, USA, January 1999. http:∥citeseer.ist.psu.edu/pereira99-secure.html [29]Kang X G, Huang J W, Shi Y Q, et al.. A DWT-DFT composite watermarking scheme robust to both affine and JPEG compression. IEEE Trans. on Circuits and Systems for Video Technology,2003, 13(8): 776-786. [30]ORuanaidh J J K, Pereira S. A secure robust digital image watermark. In Electronic Imaging: Processing, Printing and Publishing in Colour, SPIE Proceedings, Ziirich, Switzerland,May 1998. (SPIE/IST/Europto Symposium on Advanced Imaging and Network Technologies).http:∥citeseer.ist.psu.edu/181609.html [31]Pereira S, ORuanaidh J J K, Deguillaume F, et al.. Template based recovery of Fourier-based watermarks using log-polar and log-log maps. IEEE Int. Conf on Multimedia Computing and Systems (ICMCS99), Florence, Italy, June 1999. http:∥citeseer.ist.psu.edu/pereira99template.html [32]Pereira S, Pun T. Fast robust template matching for affine resistant image watermarks. In Proc.3rd Int. Information Hiding Workshop, Dresden, Germany, 1999: 207-218. [33]Csurka G, Deguillaume F, ORuanaidh J J K, et al.. A Bayesian approach to affine transformation resistant image and video watermarking. In Proc. 3rd Int. Information Hiding Workshop,Dresden, Germany, 1999: 315-330. [34]Deguillaume F, Csurka G, ORuanaidh J J K, et al.. Robust 3D DFT video watermarking. In IST/SPIE Electronic Imaging99, Session: Security and Watermarking of Multimedia Contents,San Jose, CA, USA, January 1999, Vol.3657: 113-124. [35]Digimarc Corporation, Photographic Products and Methods Employing Embedded Information,US patent 5822436, 1999.[36]Piva A. Improving DFT watermarking robustness through optimum detection and synchronization, Multimedia and Security Workshop at ACM Multimedia99, GMD, Department of Electronic Engineering, University of Florence, Italy: Report 85.[37]Voloshynovskiy S, Pereira S, Iquise V, et al.. Attack modeling: Towards a second generation watermarking benchmark. Signal processing, 2001, 81(6): 1177-1214. [38]Herrigel A, Voloshynovskiy S, Rytsar Y. The watermark template attack. In Security and Watermarking of Multimedia Contents Ⅲ, Wong P W, Delp E J, Eds. SPIE Photonics West, Electronic Imaging 2001, San Jose, CA, USA, Jan. 2001, Vol.4314: 394-405. [39]Kutter M, Bhattacharjee S K, Ebrhimi T. Towards second generation watermarking schemes.ICIP99, Kobe, Japan, October 25-28, 1999, Vol. 3: 320-323. [40]Celik M U, Saber E, Sharma G, et al.. Analysis of feature-based geometry invariant watermarking.In Proceedings of SPIE: Security and Watermarking of Multimedia Contents Ⅲ, Jan. 2001, Vol.4314: 261-268. [41]Bas P, Chassery J M, Macq B. Robust watermarking based on the warping of pre-defined triangular patterns. In Proceedings of SPIE: Security and Watermarking of Multimedia Contents Ⅱ,San Jose, CA, USA, Jan. 2000, Vol. 3971: 99-109. [42]Kaewkamnerd N, Rao K R. Wavelet based watermarking detection using multiresolution image registration. TENCON 2000, Kaula Lumpur, Malaysia, Sept. 2000. http:∥www-ee.uta.edu/dip/paper/tencon_water.pdf.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (4354) PDF downloads(1284) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return