Share Email Print

Proceedings Paper

Second-generation watermarking scheme against geometric attacks
Author(s): Zhen Ji; Weiwei Xiao; Jihong Zhang
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

In this paper, a scheme which following the second generation watermarking paradigm is proposed. The goal of this proposed scheme is basically to increase the robustness against geometric attacks. The host image is decomposed with the wavelet packet. The bit stream of binary watermark is coded into several patterns with salient feature. The circular feature is used in this paper, because: (a) the computational complexity of the method grows rapidly with more complex shapes. (b) circle is rotation-invariant and partially scale-invariant. (c) circular feature can be detected by Hough transform effectively. These patterns are embedded into wavelet packet coefficients according to human perceptual characteristics. A new HVS mask based on wavelet transform is proposed with consideration of local texture characteristics. The introduction of HVS characteristics boosts the performance of the whole scheme. For the detection of watermark, the geometric distortion is calibrated for the contaminated watermarked image. Hough transform is used to detect the circular features in the WP Coefficients. This scheme has the following characteristics: (a) robustness against the common geometric attacks(rotation, scaling, cropping, and etc) is improved significantly. (b) human perceptual characteristics is taken into consideration, so the tradeoff between invisibility and robustness is improved. Results of extensive experiments indicate that this proposed scheme is significantly effective in resisting various geometric attacks such as rotation, scaling, JPEG compression, adding noise, etc.

Paper Details

Date Published: 30 January 2003
PDF: 6 pages
Proc. SPIE 4793, Mathematics of Data/Image Coding, Compression, and Encryption V, with Applications, (30 January 2003); doi: 10.1117/12.453527
Show Author Affiliations
Zhen Ji, Shenzhen Univ. (China)
Weiwei Xiao, Shenzhen Univ. (China)
Jihong Zhang, Shenzhen Univ. (China)

Published in SPIE Proceedings Vol. 4793:
Mathematics of Data/Image Coding, Compression, and Encryption V, with Applications
Mark S. Schmalz, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?