Adaptive Print-Scan Resilient Image Watermarking Based on Fourier Transform
Received date: 2016-03-04
Revised date: 2016-04-04
Online published: 2016-05-30
廖挺, 李治江 . 基于傅里叶变换的自适应抗打印扫描水印算法[J]. 应用科学学报, 2016 , 34(3) : 309 -316 . DOI: 10.3969/j.issn.0255-8297.2016.03.008
A robust blind watermarking scheme that combines uniform log-polar mapping and perceptual band decomposition of Fourier domain is proposed, which can resist general print-scan attacks. The proposed scheme can guarantee invisibility and increase robustness of the watermark. Perceptual band decomposition that splits the Fourier domain into overlapping sub-bands is used to locate the mid-frequency domain. Uniform log-polar mapping is applied to mid-frequencies in the Fourier domain. Watermark embedding in the mid-frequencies is adaptively controlled by the local spectrum property. Finally, a spatial perceptual mask is used to compensate distortion after the embedded image is inversely transformed back to the spatial domain. Both the theoretical analysis and experimental results show that the proposed scheme is invisible, and robust against general print-scan attacks.
[1] Min W, Bede L. Data hiding in image and video:part I-fundamental issues and solutions[J]. IEEE Transactions on Image Processing, 2003, 12(6):685-95.
[2] Lin C Y, Chang S F. Distortion modeling and invariant extraction for digital image print-andscan process[J]. Journal of Mechanical Working Technology, 1970, 10(3):376-381.
[3] Solanki K, Madhow U, Manjunath B S. ‘Print and scan’ resilient data hiding in images[J]. IEEE Transactions on Information Forensics & Security, 2006, 1(1):464-478.
[4] Amiri S H, Jamzad M. Robust watermarking against print and scan attack through efficient modeling algorithm[J]. Signal Processing Image Communication, 2014, 29(10):1181-1196.
[5] Zheng D, Zhao J, El-Saddik A. RST-invariant digital image watermarking based on logpolar mapping and phase correlation[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2003, 13(8):753-765.
[6] Kang X, Huang J, Zeng W. Efficient general print-scanning resilient data hiding based on uniform log-polar mapping[J]. IEEE Transactions on Information Forensics & Security, 2010, 5(1):1-12.
[7] Urvoy M, Goudia D, Autrusseau F. Perceptual DFT watermarking with improved detection and robustness to geometrical distortions[J]. IEEE Transactions on Information Forensics & Security, 2014, 9(7):1108-1119.
[8] Liu H J, Steinebach M. Improved Fourier domain patchwork and template embedding using spatial masking[C]//Proceedings of SPIE the International Society for Optical Engineering, 2012, 8303:830305.
[9] He D, Su Q. A practical print-scan resilient watermarking scheme[C]//IEEE International Conference on Image Processing, 2005:257-260.
[10] Watson A B. The cortex transform:rapid computation of simulated neural images[J]. Computer Vision Graphics & Image Processing, 1987, 39(3):311-327.
[11] Bekkat N, Saadane A, Barba D. Masking effects in the quality assessment of coded images[C]//Proceedings of SPIE, Human Vision and Electronic Imaging, 2000:211-219.
[12] Barni M, Bartolini F, Piva A. Improved wavelet-based watermarking through pixel-wise masking[J]. IEEE Transactions on Image Processing a Publication of the IEEE Signal Processing Society, 2001, 10(5):783-791.
[13] 王晶,王向阳. 基于人类视觉系统的数字图像水印方法[J]. 计算机工程,2011, 37(13):107-108. Wang J, Wang X Y. Digital image watermark method based on human visual system[J]. Computer Engineering, 2011, 37(13):107-108. (in Chinese)
[14] 尤新刚,郭云彪,周琳娜. 峰值信噪比不宜用来评价信息隐藏技术[C]//全国信息隐藏学术研讨会. 2001:129-134. You X G, Guo Y B. PSNR should not be used to evaluate the information hiding[C]//Third National Symposium on Information Hiding. 2001:129-134. (in Chinese)
/
| 〈 |
|
〉 |