[go: up one dir, main page]

WO2002013138A1 - Method for adaptive digital watermarking robust against geometric transforms - Google Patents

Method for adaptive digital watermarking robust against geometric transforms Download PDF

Info

Publication number
WO2002013138A1
WO2002013138A1 PCT/IB2000/001089 IB0001089W WO0213138A1 WO 2002013138 A1 WO2002013138 A1 WO 2002013138A1 IB 0001089 W IB0001089 W IB 0001089W WO 0213138 A1 WO0213138 A1 WO 0213138A1
Authority
WO
WIPO (PCT)
Prior art keywords
watermark
image
block
wavelet
steps
Prior art date
Application number
PCT/IB2000/001089
Other languages
French (fr)
Inventor
Svyatoslav Voloshynovskiy
Frederic Deguillaume
Alexander Herrigel
Thierry Pun
Original Assignee
Digital Copyright Technologies Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digital Copyright Technologies Ag filed Critical Digital Copyright Technologies Ag
Priority to AU2000260104A priority Critical patent/AU2000260104A1/en
Priority to PCT/IB2000/001089 priority patent/WO2002013138A1/en
Publication of WO2002013138A1 publication Critical patent/WO2002013138A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0064Geometric transfor invariant watermarking, e.g. affine transform invariant
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/3217Transform domain methods using wavelet transforms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/3232Robust embedding or watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32352Controlling detectability or arrangements to facilitate detection or retrieval of the embedded information, e.g. using markers
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness

Definitions

  • the invention refers to the field of digital watermarking and in particular to generating and extracting digital watermarks for images or video sequences .
  • the perceptual mask has to determine the optimal level of allowable distortions for the watermark embedding.
  • HVS human visual system
  • the main problem consists in the content-adaptive watermarking, since in the most cases the HVS mask is given in the coordinate domain and watermark embedding is performed in some transform domain (block-wise and full-frame discrete Fourier (DFT) or discrete cosine (DCT) transforms, wavelet or Radon transforms) .
  • DFT block-wise and full-frame discrete Fourier
  • DCT discrete cosine
  • the embedded watermark is then transformed to the coordinate domain and mapped by the mask.
  • More recent me- thods try to utilize either transform domain masking based on a just noticeable difference that originates from the image compression applications (I. Podilchuk and W. Zeng, "Image-Adaptive Watermarking Using Visual Models", IEEE Journal on Selected Areas in Communications, 16(4), 525-539), or combined masking in frequency and coordinate domains (U.
  • the template approach needs a computationally expensive exhaustive search for recovering these transforms together, and it is susceptible to unauthorized removal of template peaks .
  • the water- mark is replicated in the image in order to create 4 repetitions of the same watermark.
  • the corresponding 9 peaks in the ACF are used to recover undergone geometrical transformations.
  • the descending heights of the ACF peaks shaped by the triangular envelope function reduce the robustness of this approach against geometrical attacks accompanied by a lossy compression.
  • DFT discrete Fourier transforms
  • a further requirement for digital watermarking is a sufficient information capacity of the watermark.
  • the invention resides in a method for embedding a digital watermark w in an image x, comprising the steps of encoding a digital message b in a codeword c, mapping the codeword c and allocating the mapped codeword c into a block B, producing a symmetric block B' of fourfold size by flipping and copying the block B once in every block direction, tiling the symmetric block B' in order to generate a symmetric digital watermark w with a period B' and embedding the watermark w in the image x in order to obtain a stego image y.
  • the block flipping makes the watermark w robust against stego image flipping attacks, i.e. rotations by 90°, 180° or 270°, and reduces the number of ambiguities during estimation of the undergone geometrical attacks . Furthermore, the block flipping increases the invisibility of the watermark w by visually decorrelating its repetitive structure in the coordinate domain.
  • Preferred embodiments are: adding a secret-key-dependent reference watermark w ref in remaining orthogonal spatial locations of the block B to render the resulting watermark w robust against translation or cropping attacks undergone by the stego image y; up-sampling pixels of the block B or equivalently B' at least twofold in each block dimension for creating robustness against the finite resolution of image input or output media, such as printers and scanners; using a turbo code or a low-density parity check code for encoding the digital message b thereby keeping the block size small; using a secret encryption key for encrypting the codeword c and/or a secret block allocation key for block allocation to improve the safety of message hiding and decoding; embedding the watermark w in the image x in wavelet sub-bands k,l, wherein k is a resolution index and 1 a direction index thereby provi- ding full compatibility of the embedding procedure with the recently developed wavelet-based compression standard JPEG2000.
  • the invention further resides in a method for embedding a watermark w in an image x, comprising the steps of: calculating image wavelet components x u (i, j) and watermark wavelet components w k l (i, j) for pixel locations i,j, based on the x k l (i, j) calculating in the wavelet sub-bands k, 1 a noise visibility function NVF k , ⁇ (i/j) and therefrom a perceptual mask PM k , ⁇ (i,j) for masking the w k l (i, j) and embedding the masked watermark wavelet components into the i c i r) to produce stego image wavelet components y* / (?
  • Preferred embodiments refer to: calculating the noise visibility function NVF k , ⁇ (i,j) from a stationary generali- zed Gaussian model or a non-stationary Gaussian model of the image x; incorporating in the perceptual mask PM k , ⁇ (i,j) watermark strengths S , ⁇ for edges and textures of the image x with a weighting factor 1-NVF and watermark strengths S f , ⁇ for flat regions of the image x with a weighting factor NVF; wavelet-domain embedding by multiplying PM k , ⁇ (i,j) with w fc!
  • the invention further resides in a method for extracting a watermark w, that was previously embedded according to invention, from a possibly attacked stego image y' , comprising the steps of: calculating an estimated watermark w from the stego image y 1 , defiling the estimated watermark w into the symmetric block B' by summing correspon- ding portions of a plurality of periods of the estimated watermark w and converting the symmetric block B' into the block B and extracting the digital message b from the block B.
  • This extraction method assures that full advantage is taken of the tiling and flipping operations per- formed during watermark embedding.
  • Preferred embodiments refer to : using a maximum a posteriori probability (MAP estimation) for calculating the estimated watermark w; estimating a watermark-covariance matrix R w globally; estimating an image-covariance matrix R x locally; estimating and correcting a geometric affine transform from peaks in the spectral power density
  • MAP estimation maximum a posteriori probability
  • Fig. 1 an embodiment for generating a digital watermark w robust against geometrical transforms
  • Fig. 2a exemplary wavelet pyramids of a cover image x ("Lena"), in Fig. 2b of the digital watermark w, and in Fig. 2c of the noise visibility function NFV of the cover image x
  • Fig. 3a the modulation transfer function (MTF) of the human visual system (HVS) and a state-of-the-art non-adaptive embedding;
  • MTF modulation transfer function
  • Fig. 3b a 1-dimensional wavelet decomposition and Fig. 3c an adaptive embedding according to a preferred embodiment
  • Fig. 4 a 2-dimensional wavelet decomposition related to the MTF
  • Fig. 5 an embodiment for embedding the digital watermark w robustly in the wavelet domain
  • Fig. 6 an embodiment for extracting and decoding the digital watermark w from an attacked stego image y' ;
  • Fig. 7a-7d digital watermarks w, w extracted by using spectral power density peaks: cover image x-stego image y (Fig. 7a) ; watermark estimated by denoi- sing a stego image y (Fig. 7b) , a compressed ste- go image y' (Fig. 7c) and a rotated and compressed stego image y' (Fig. 7d) .
  • Fig. 1 shows an example of watermark creation.
  • the message b is first encoded 1 in a codeword c using preferably either low-density parity check codes (R. Gallager) or turbo codes (C. Berrou and A. Glaemper) , the publications of which are herewith incorporated in this applica- tion in their entirety by reference.
  • the maximum rate at which these codes can be used is known to be bounded below channel capacity.
  • the existence of simple iterative decoding schemes and their outstanding error performance more than compensate this weakness.
  • the codeword c is then mapped 2 from ⁇ 0,1 ⁇ to ⁇ -1,1 ⁇ and encrypted 3 by multiplying on a key-dependent sequence p with following spreading 4 over a square block B of size N, x N, with some density D using a secret key.
  • a key-dependent sequence p with following spreading 4 over a square block B of size N, x N, with some density D using a secret key.
  • it could also be a rectangular block B or a block B of any shape.
  • the key-dependent reference watermark w ref is added 5 to the above block B in some or all remaining orthogonal spatial locations .
  • the reference watermark w ref is used to recover cropping and translation based on the cross- correlation with the attacked stego image y' .
  • the reference watermark w ref consists of a binary key-dependent sequence ⁇ -1,1 ⁇ and its length is determined by the embedding density (1-D) as is described above.
  • the resulting block B is up-sampled 6 by the factor 2 to receive a low-pass watermark and then flipped and copied 7 once in each direction, producing a symmetric block B' of size 4N l x4N l .
  • the flipping 7 is performed to visually decorrelate the structure of the repeated watermark w and to reduce the number of ambiguities during estimation of the undergone geometrical attacks.
  • L 64 bit messages that are encoded using the turbo code
  • the final block B' after up-sampling 6 and flipping 7 has the size 76x76 _ r pfte gcheme is very flexible in respect to the encoding 1 and can use any known modulation technique or even more advanced error correction codes (ECC) .
  • ECC advanced error correction codes
  • Stochastic multi-resolution image modeling and watermark embedding The principle of watermark embedding is shown in Fig. 5.
  • a linear additive scheme is used in the wavelet domain.
  • Both the cover image x and the watermark w are first decomposed into multi-resolution sub-band pyramids using the (discrete) Forward Wavelet Transform (FWT or DWT) .
  • FWT or DWT Forward Wavelet Transform
  • the cover image x is padded to a square size of the nearest larger number to the original cover image size of power of 2 in order to apply a standard wavelet transform DWT, 9.
  • N w 5 levels are used for the DWT based on the Daubechies 8-tap filter (M.
  • the watermarking process is applied and adapted to each (k,l) wavelet sub-band component separately as described below.
  • the stego image y is reconstructed by computing the Inverse Wavelet Transform (IWT, 12) of the digitally watermarked image pyramid.
  • the NVF is for the first modified in order to include the multi-resolution paradigm in the stochastic framework to take into account a modulation transfer function (MTF) of the HVS and to match the proposed watermarking algorithm with the recently developed image compression standard JPEG2000 for future integration.
  • MTF modulation transfer function
  • the second reason to use wavelet domain embedding is motivated by the desire to incorporate the anisotropy of the HVS to different spatial directions in the perceptual mask PM k , ⁇ (i,j), 11.
  • the coordinate domain version of the NVF used only an isotropic image decomposition based on the extraction of a local mean from the original image or its high-pass filtered counterpart.
  • the watermark strengths S can be varied for different orientations 1 in the proposed mask PMk, ⁇ (i,j), 11.
  • the NVF is based on a stationary Generalized Gaussian (sGG) model or on a non-stationary Gaussian model of the cover image x or the cover image wavelet coefficients X k i V ' J) ror every sub-band k, 1. Accordingly the perceptual edge and texture masking in the wavelet domain is modeled based on the NVF, of pixel (i, j) , for each sub-band component (k,l) :
  • is the global variance of the wavelet image coefficients from sub-band (k,l) , and the watermark wavelet components w k j (i, j) can be written as
  • T(t) is the gamma function.
  • the NVF's features for a given sub-band k, 1 are determined by the global sub- band variance ⁇ and by the shape parameter y kJ ⁇ i, j) which is estimated based on the moment matching method (A. Jain, "Fundamentals of digital image processing", Prentice-Hall, 1989) .
  • An example of the NVF pyramid for image "Lena” is shown in Fig. 2c.
  • the y j ⁇ j) are the obtained stego wavelet components and PM k , ⁇ (i,j) • w 4 (z, j) are the perceptually masked watermark wavelet components.
  • S , ⁇ is an embedding strength for the edges and textures
  • S f k , ⁇ is a strength for the flat regions of the cover image x.
  • Visual masking is ensured first by choosing greater than S f k , ⁇ for edges and textures hiding, and second by using adapted strengths for each resolution, and even for each orientation based on the properties of the MTF.
  • An example of practically used embedding parameters according to the MTF properties, considering cover image pixel values in the range [0,255], are:
  • the watermark strengths or embedding parameters S e , ⁇ , S f , ⁇ reflect very important particularities of the HVS.
  • the strengths of watermark for the diagonal directions are chosen to be higher than for the vertical and horizontal ones. This is motivated by the fact that the anisotropy sensitivity of the HVS to the diagonally oriented patterns is lower than for the vertical and horizontal directions. Therefore, it makes possible to embed stronger watermark signals there.
  • it allows to obtain, as a result, better robustness against lossy compression (both JPEG-DCT and wavelet JPEG2000) .
  • the lossy compression is exploiting the same property of the HVS to allocate smaller amounts of bits in the diagonal directions for the image coding. Therefore, the proposed embedding technique utilizes both information about the HVS and the quantization of lossy image coding to increase the robustness of the watermark w.
  • the MTF of the HVS has a typical frequency dependence, as is shown in Fig. 3a (A. Jain, p. 55), with a maximum in a low frequency range and decreasing side lobes at very low and middle to high frequencies .
  • the typical additive white Gaussian watermark has a uniform spectrum.
  • a uniform increase of the watermark strength or equivalently watermark power density would violate the invisibility constraint at low frequencies.
  • FIG. 6 A generalized block-diagram of watermark extraction is shown in Fig. 6.
  • the embedded watermark w is first estimated 13, w from the possibly attacked stego image y'.
  • geometric distortions which may have occurred are retrieved and compensated 15 to obtain a rectified watermark w rec , by analyzing 14 the Fourier transform F(w) or the spectral power density magnitude
  • the tiled blocks are then detiled or averaged 16 in order to get an estimate of the embedded redundant sequence according to the maximum likelihood (ML) estimate for a Gaussian chan- nel .
  • the cropping and translation are compensated 19 using cross-correlation 18 with the reference key- dependent watermark w ref , 17.
  • the message is decrypted 20 and decoded 21.
  • MAP a maximum a posteriori probability estimate
  • ⁇ ( ⁇ n, n) is a local variance of the stego image y in the coordinates (m,n) , for an image of size N xM .
  • the estimate (G7) is a global mean value of the watermark variance.
  • other robust versions of (G7) such as a robust median estimate of the variance could be applied, as well. Determining affine gepmetrical distortions:
  • the peaks layout will be re-scaled, rotated and/or sheared, but alignments will be preserved. Therefore, it any affine geometrical distortion can be estimated from these peaks by fitting alignments and estimating periods .
  • is a negative log-likelihood function associated with the distribution of the misaliments and k is a number of matched points.
  • the misalignment distribution is Gaussian, and one receives a quadratic log-likelihood function mi 2 and the corresponding mean square error minimization criterion.
  • the above problem could be solved based on the theory of robust M- estimators, if some ambiguity about misalignment distribution exists.
  • Fig. 7a-7d show peaks extracted from the magnitude spectrum of the watermark
  • the real embedded watermark w is shown that was calculated by subtracting y-x using the knowledge of the cover image x in a non-oblivious approach, whereas in Fig. 7b the Wiener predicted watermark w is taken. Therefore, these peaks can be extracted from the stego data with high fidelity based on the estimated watermark w without knowledge of the cover image x.
  • This important conclusion is also connected with the observation that the embedded watermark w is mostly allocated in the middle frequency band. This has double importance. First, low frequencies of the stego image y or y' are not altered considerably in order not to produce visible distortions.
  • Recovering translation and cropping is based on the refe- rence key-dependent watermark w ref , 17 (Fig. 6) .
  • watermark detiling 16 i.e. coherent summation of the estimated watermark w from different periods. This results in the symmetric block B' that is converted to the final block B of size N ⁇ N, .
  • the block B is correlated 18 with the reference watermark w re .
  • the maximum of cross- correlation 18 makes possible to establish the undergone translation or cropping that is easily compensated 19.
  • the detector should be designed for stationary non-Gaussian noise or for the non- stationary Gaussian case.
  • symbol-by-symbol MAP decoder for the turbo code that is commonly known as a BCJR decoder, a log-MAP or a max-log-MAP decoder, i.e. soft decoding, that is known to be superior in comparison with the hard decoding for Gaussian channels.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

A method for digital content adaptive watermarking robust against general affine transforms, cropping and compression is disclosed. The method is based on a wavelet domain additive watermarking with a multiresolution perceptual mask (11) determined by the stochastic noise visibility function NVF of the cover image x. It is shown how to encode messages b and how to design the periodic watermark w in order to recover, based on the watermark Fourier magnitude spectrum F(w), general affine transform and compression attacks. Furthermore, it is demonstrated that the method is flexible and compatible with any message encoding technique and in particular with turbo codes, BJCR-, log-MAP and max-log-MAP decoders and with low-density parity check codes.

Description

Method for Adaptive Digital Watermarking Robust Against Geometric Transforms
TECHNICAL FIELD
The invention refers to the field of digital watermarking and in particular to generating and extracting digital watermarks for images or video sequences .
BACKGROUND ART
Two major conflicting constraints on digital image watermarks are invisibility, i.e. avoiding perceptible arti- facts in the watermarked or stego image, and robustness, i.e. resistance against various intentional or unintentional attacks such as affine geometric transforms (rotation, scaling, aspect ratio changes, shear) , translation, cropping, image compression etc. In earlier solutions the information to be embedded was encoded using e.g. M-ary modulation (M. Kutter, "Performance Improvement of Spread-Spectrum based Image Watermarking Schemes through M-ary Modulation" , Lecture Notes in Computer Science: Third International Workshop on In- formation Hiding, Springer, Vol. 1768, 237-252) or algebraic error correction codes (ECC) (J. R. Hernandez, F. Perez-Gonzalez, J. M. Rodrigez and G. Nieto, "The impact of channel coding on the performance of spatial watermarking for copyright protection", Proc . ICASSP'98, 2973-2976, May 1998) . M-ary encoding suffers from a high complexity of the watermark demodulator, whereas error correction codes are less effective. On the other hand, turbo codes and BCJR, log-MAP or max-log-MAP decoders (C. Berrou and A. Glavieux, "Near optimum error correc- ting coding and decoding: turbo-codes", IEEE Trans. Comm. , 1261-1271, October 1996) or low-density parity check codes (R. Gallager, "Low-density parity-check codes", IRE Transactions on Information Theory, January 1962) have not been applied to digital watermarking.
The perceptual mask has to determine the optimal level of allowable distortions for the watermark embedding. An overview of empirical masking methods based on the deterministic models of the human visual system (HVS) is given by S. Voloshynovskiy, A. Herrigel, N. Baumgartner and T. Pun, "A Stochastic Approach to Content Adaptive Digi- tal Image Watermarking" , Lecture Notes in Computer Science: Third International Workshop on Information Hiding, Springer, Vol. 1768, 211-236. The main problem consists in the content-adaptive watermarking, since in the most cases the HVS mask is given in the coordinate domain and watermark embedding is performed in some transform domain (block-wise and full-frame discrete Fourier (DFT) or discrete cosine (DCT) transforms, wavelet or Radon transforms) . The embedded watermark is then transformed to the coordinate domain and mapped by the mask. More recent me- thods try to utilize either transform domain masking based on a just noticeable difference that originates from the image compression applications (I. Podilchuk and W. Zeng, "Image-Adaptive Watermarking Using Visual Models", IEEE Journal on Selected Areas in Communications, 16(4), 525-539), or combined masking in frequency and coordinate domains (U. S. Pat. No. 6,031,914). In the latter, a major drawback is that both a frequency-domain and a spatial-domain perceptual mask must be applied consecutively in order to achieve invisibility. Furthermore, the watermark can only be extracted when the unmarked image is accessible.
In the above-mentioned publication by S. Voloshynovskiy et al . a stochastic perceptual mask based on a noise visibility function NVF is proposed. However, since the NVF and the perceptual mask are developed only in the spatial coordinate domain, they are not well adapted for calcula- tions in a frequency domain and are not easily modifiable by restrictions stemming from the frequency domain.
Robustness against geometrical distortions has so far been relied on using a transform invariant domain (J. Oruanaidh and T. Pun, "Rotation, Scale and Translation Invariant Spread Spectrum Digital Image Watermarking" , Signal Processing 66(3), 303—317, 1998), or an additional template (WO 96/36163), or an Autocorrelation Function (ACF) of the watermark itself (M. Kutter, "Watermarking resistent to translation, rotation and scaling", Proc . SPIE Int. Symp. on Voice, Video, and Data Communication, 1998) . The transform invariant domain approach suffers from interpolation and accuracy problems, therefore requires comparatively large images of size 512x512, and cannot recover rotational and aspect ratio changes simultaneously. The template approach needs a computationally expensive exhaustive search for recovering these transforms together, and it is susceptible to unauthorized removal of template peaks . In the ACF approach the water- mark is replicated in the image in order to create 4 repetitions of the same watermark. The corresponding 9 peaks in the ACF are used to recover undergone geometrical transformations. However, the descending heights of the ACF peaks shaped by the triangular envelope function reduce the robustness of this approach against geometrical attacks accompanied by a lossy compression. The need for computing two discrete Fourier transforms (DFT) of double image size to estimate the ACF poses problems in real time applications with large images. A further requirement for digital watermarking is a sufficient information capacity of the watermark. In order to attach a unique identifier to each buyer of an image, a typical watermark should be able to carry at least 60-100 bits of information. However few publications deal with 60 or more bits. From the above review it is concluded that the existing technologies exhibit at least one of the following problems :
1. Constrained spatial domain modulation for content- adaptive watermarking.
2. Inability to resist against geometrical transforms accompanied by the lossy JPEG compression.
3. Low simultaneous robustness against lossy JPEG (DCT- based) and wavelet compression. 4. Low robustness against printing/rescanning for high quality commercial magazine printing.
5. No protection against intentional template removal.
6. Less than 60 bits encoding for limiting the complexity of the watermark demodulator or decoder.
DISCLOSURE OF THE INVENTION
It is the object of the present invention to provide an improved method of the type mentioned above that is in particular capable of dealing with at least some, preferably all of these problems. This object is achieved by the subject-matter as set forth in the independent claims. Preferred embodiments are described in the dependent claims. The present invention is well suited for watermarking still images and video data.
The invention resides in a method for embedding a digital watermark w in an image x, comprising the steps of encoding a digital message b in a codeword c, mapping the codeword c and allocating the mapped codeword c into a block B, producing a symmetric block B' of fourfold size by flipping and copying the block B once in every block direction, tiling the symmetric block B' in order to generate a symmetric digital watermark w with a period B' and embedding the watermark w in the image x in order to obtain a stego image y. By tiling or repeating the basic block B' a plurality of times, periodic features are introduced into the final watermark w both in the coordina- te and frequency domain, that can be used for retrieving affine transform attacks undergone by the stego image. The block flipping makes the watermark w robust against stego image flipping attacks, i.e. rotations by 90°, 180° or 270°, and reduces the number of ambiguities during estimation of the undergone geometrical attacks . Furthermore, the block flipping increases the invisibility of the watermark w by visually decorrelating its repetitive structure in the coordinate domain.
Preferred embodiments are: adding a secret-key-dependent reference watermark wref in remaining orthogonal spatial locations of the block B to render the resulting watermark w robust against translation or cropping attacks undergone by the stego image y; up-sampling pixels of the block B or equivalently B' at least twofold in each block dimension for creating robustness against the finite resolution of image input or output media, such as printers and scanners; using a turbo code or a low-density parity check code for encoding the digital message b thereby keeping the block size small; using a secret encryption key for encrypting the codeword c and/or a secret block allocation key for block allocation to improve the safety of message hiding and decoding; embedding the watermark w in the image x in wavelet sub-bands k,l, wherein k is a resolution index and 1 a direction index thereby provi- ding full compatibility of the embedding procedure with the recently developed wavelet-based compression standard JPEG2000.
The invention further resides in a method for embedding a watermark w in an image x, comprising the steps of: calculating image wavelet components xu (i, j) and watermark wavelet components wk l(i, j) for pixel locations i,j, based on the xk l (i, j) calculating in the wavelet sub-bands k, 1 a noise visibility function NVFk,ι(i/j) and therefrom a perceptual mask PMk,ι(i,j) for masking the wk l (i, j) and embedding the masked watermark wavelet components into the ic i r) to produce stego image wavelet components y*/(?' >./) and calculating by an inverse discrete wavelet transformation (IDWT) the stego image y. By using a stochastic approach to image analysis based on the NVF and by defining in the wavelet domain the NVF and a NVF-based per- ceptual mask PM, invisibility constraints, frequency- domain constraints and geometric robustness constraints can be incorporated into a single perceptual mask PM.
Preferred embodiments refer to: calculating the noise visibility function NVFk,ι(i,j) from a stationary generali- zed Gaussian model or a non-stationary Gaussian model of the image x; incorporating in the perceptual mask PMk,ι(i,j) watermark strengths S ,ι for edges and textures of the image x with a weighting factor 1-NVF and watermark strengths Sf ,ι for flat regions of the image x with a weighting factor NVF; wavelet-domain embedding by multiplying PMk,ι(i,j) with wfc!(z, /) and adding xkιl (i, j) ; adapting the watermark strengths S ,ι and/or Sf k,ι in order to take advantage of a frequency-dependent modulation transfer function (MTF) and/or a spatial orientational dependence of the human visual system (HVS) ; in particular choosing Se k,ι ≥ Sf k,ι for a majority of or all wavelet sub-band indices k, 1 and/or choosing Seι,ι>Se 2,ι>Se 3/ι>Se,ι<Se 5,ι and Sfι,1>Sf 2,ι>Sf 3,ι>Sf 4,ι Sf5,ι for k=1...5 and/or choosing Se k,ι<Se k,3, Se k,2<Se k,3 and Sf k/1<Sf k,3, Sf k,2<Sf k,3, wherein the indices 1=1 and 1=2 denote a horizontal and vertical orientation and 1=3 a diagonal orientation in the image x; and/or compressing the image x in the wavelet sub-bands k, 1 before the watermark embedding in order to realize "compressed domain watermarking". The invention further resides in a method for extracting a watermark w, that was previously embedded according to invention, from a possibly attacked stego image y' , comprising the steps of: calculating an estimated watermark w from the stego image y1, defiling the estimated watermark w into the symmetric block B' by summing correspon- ding portions of a plurality of periods of the estimated watermark w and converting the symmetric block B' into the block B and extracting the digital message b from the block B. This extraction method assures that full advantage is taken of the tiling and flipping operations per- formed during watermark embedding.
Preferred embodiments refer to : using a maximum a posteriori probability (MAP estimation) for calculating the estimated watermark w; estimating a watermark-covariance matrix Rw globally; estimating an image-covariance matrix Rx locally; estimating and correcting a geometric affine transform from peaks in the spectral power density |F(W) |2 and/or the autocorrelation function (ACF) w*w of the estimated watermark w; cross-correlating the block B with a reference watermark wref to compensate translations and/or cropping; down-sampling a previously up-sampled block B by averaging identical neighbouring pixels; using secret key for block deallocation and/or message decryption; and/or using a BJCR, a log-MAP or a max-log-MAP decoder for soft decoding previously turbo-coded digital messages b.
Other objects, features and advantages of the present invention will become apparent from the description in connection with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
The drawings show in
Fig. 1 an embodiment for generating a digital watermark w robust against geometrical transforms; Fig. 2a exemplary wavelet pyramids of a cover image x ("Lena"), in Fig. 2b of the digital watermark w, and in Fig. 2c of the noise visibility function NFV of the cover image x; Fig. 3a the modulation transfer function (MTF) of the human visual system (HVS) and a state-of-the-art non-adaptive embedding;
Fig. 3b a 1-dimensional wavelet decomposition and Fig. 3c an adaptive embedding according to a preferred embodiment;
Fig. 4 a 2-dimensional wavelet decomposition related to the MTF;
Fig. 5 an embodiment for embedding the digital watermark w robustly in the wavelet domain; Fig. 6 an embodiment for extracting and decoding the digital watermark w from an attacked stego image y' ; and
Fig. 7a-7d watermark extraction using spectral power density peaks: watermark w=cover image x-stego image (Fig. 7a) , an estimated
Fig. 7a-7d digital watermarks w, w extracted by using spectral power density peaks: cover image x-stego image y (Fig. 7a) ; watermark estimated by denoi- sing a stego image y (Fig. 7b) , a compressed ste- go image y' (Fig. 7c) and a rotated and compressed stego image y' (Fig. 7d) .
In the drawings identical parts are designated by identical reference numerals. MODES FOR CARRYING OUT THE INVENTION
Formulation of a preferred embodiment:
We formulate the embedding process as an additive content-adaptive watermarking in the wavelet domain with the watermark possessing special spatial structure that enables to recover general affine transforms. We assume that we are given a cover image to be watermarked denoted x. If it is an RGB image we work with the luminance component, though the same methodology can be applied to other color spaces. The given message (the copyright information or URL address) in binary form b = (b1 ,...,bLJ is to be embedded in the cover image x = (xv...,xN ) of size M, xM2 , where N = M1 - M2 .
Message encoding and spatial allocation: Fig. 1 shows an example of watermark creation. The message b is first encoded 1 in a codeword c using preferably either low-density parity check codes (R. Gallager) or turbo codes (C. Berrou and A. Glavieux) , the publications of which are herewith incorporated in this applica- tion in their entirety by reference. The maximum rate at which these codes can be used is known to be bounded below channel capacity. However, the existence of simple iterative decoding schemes and their outstanding error performance more than compensate this weakness. The codeword c is then mapped 2 from {0,1} to {-1,1} and encrypted 3 by multiplying on a key-dependent sequence p with following spreading 4 over a square block B of size N, x N, with some density D using a secret key. In the general case, it could also be a rectangular block B or a block B of any shape.
The key-dependent reference watermark wref is added 5 to the above block B in some or all remaining orthogonal spatial locations . The reference watermark wref is used to recover cropping and translation based on the cross- correlation with the attacked stego image y' . The reference watermark wref consists of a binary key-dependent sequence {-1,1} and its length is determined by the embedding density (1-D) as is described above. The resulting block B is up-sampled 6 by the factor 2 to receive a low-pass watermark and then flipped and copied 7 once in each direction, producing a symmetric block B' of size 4Nl x4Nl . The flipping 7 is performed to visually decorrelate the structure of the repeated watermark w and to reduce the number of ambiguities during estimation of the undergone geometrical attacks. Finally, the 4^x4^ block B' is repeated preferably over the whole image size, resulting in a symmetrical and periodical watermark w with periods T, — T2 = 4N, . In our applications we use L=64 bit messages that are encoded using the turbo code
(K=132). The block size is chosen to be JVj=19 resulting in a density D=0.74 in order to have exactly 2 times repetition of the codeword c in every block B. The final block B' after up-sampling 6 and flipping 7 has the size 76x76 _ rpfte gcheme is very flexible in respect to the encoding 1 and can use any known modulation technique or even more advanced error correction codes (ECC) .
Stochastic multi-resolution image modeling and watermark embedding: The principle of watermark embedding is shown in Fig. 5. To embed the above obtained watermark w in a cover image x a linear additive scheme is used in the wavelet domain. Both the cover image x and the watermark w are first decomposed into multi-resolution sub-band pyramids using the (discrete) Forward Wavelet Transform (FWT or DWT) . First, the cover image x is padded to a square size of the nearest larger number to the original cover image size of power of 2 in order to apply a standard wavelet transform DWT, 9. In the numeric example below, Nw = 5 levels are used for the DWT based on the Daubechies 8-tap filter (M. Vetterli and J. Kovacevic, "Wavelets and Sub- band Coding", Prentice Hall, 1995). This results in 6 resolution sub-bands k or scales. Scales from 1 to Nw = 5 are also divided into 3 components corresponding to distinct orientations 1, for horizontal (H) , vertical (V) and diagonal (D) directions. The lowest scale k = Nw + l however consists of only a low-pass component. Fig. 2a shows the pyramids of the cover image x and Fig. 2b of the watermark w.
The watermarking process is applied and adapted to each (k,l) wavelet sub-band component separately as described below. Finally, the stego image y is reconstructed by computing the Inverse Wavelet Transform (IWT, 12) of the digitally watermarked image pyramid.
An important issue is the adaptation of the watermark w to the properties of the HVS, i.e. content-adaptive watermarking. Assuming we are given a masking function of the HVS, we wish to embed the above described watermark into the cover image x keeping it under the threshold of visual imperceptibility . We propose to use a stochastic perceptual mask PMk,ι(i,j), 11 based on a noise visibility function (NVF) proposed by Voloshynovskiy et al and earlier developed only for the coordinate domain. Here the NVF is for the first modified in order to include the multi-resolution paradigm in the stochastic framework to take into account a modulation transfer function (MTF) of the HVS and to match the proposed watermarking algorithm with the recently developed image compression standard JPEG2000 for future integration. This practically means that different watermark strengths S or Se, Sf are as- signed to different image sub-bands k, 1. Such a modification leads to a non-white spectrum of watermarks w being matched with the MTF. Previously this could not be achieved with the coordinate-domain based version of the NVF. The second reason to use wavelet domain embedding is motivated by the desire to incorporate the anisotropy of the HVS to different spatial directions in the perceptual mask PMk,ι(i,j), 11. The coordinate domain version of the NVF used only an isotropic image decomposition based on the extraction of a local mean from the original image or its high-pass filtered counterpart. In the wavelet domain k, 1 the image coefficients in 3 basic spatial directions, i.e. horizontal (1=1), vertical (1=2) and diagonal (1=3), are received as a result* of the decomposition, which therefore allows to exploit the anisotropic sensitivity of the HVS. As a result, the watermark strengths S can be varied for different orientations 1 in the proposed mask PMk,ι(i,j), 11.
The NVF is based on a stationary Generalized Gaussian (sGG) model or on a non-stationary Gaussian model of the cover image x or the cover image wavelet coefficients Xk i V' J) ror every sub-band k, 1. Accordingly the perceptual edge and texture masking in the wavelet domain is modeled based on the NVF, of pixel (i, j) , for each sub-band component (k,l) :
Figure imgf000014_0001
σ~ is the global variance of the wavelet image coefficients from sub-band (k,l) , and the watermark wavelet components wk j (i, j) can be written as
Figure imgf000014_0002
where T(t) is the gamma function. The NVF's features for a given sub-band k, 1 are determined by the global sub- band variance σ~ and by the shape parameter ykJ {i, j) which is estimated based on the moment matching method (A. Jain, "Fundamentals of digital image processing", Prentice-Hall, 1989) . An example of the NVF pyramid for image "Lena" is shown in Fig. 2c.
Finally the weighted watermark is added to the cover image x using the following embedding rule: yk,t («, J)= xkJ (*, j)+ ((l - MFkJ (i, ;)) Sk e, + NVFU (i, > S , ) wu (i, j) (G4) wherein the factor in front of the wk l (i, j) defines the perceptual mask PMk,ι(i,j). The y j\ j) are the obtained stego wavelet components and PMk,ι(i,j) • w4 (z, j) are the perceptually masked watermark wavelet components. S ,ι is an embedding strength for the edges and textures, and Sf k,ι is a strength for the flat regions of the cover image x. Visual masking is ensured first by choosing
Figure imgf000015_0001
greater than Sf k,ι for edges and textures hiding, and second by using adapted strengths for each resolution, and even for each orientation based on the properties of the MTF. An example of practically used embedding parameters according to the MTF properties, considering cover image pixel values in the range [0,255], are:
18 18 20 0 0.1 0.1 0.2 0
11 11 15 0 0.2 0.2 0.5 0 k,l 5 5 7 0 °k,l 0.5 0.5 1 0
2 2 4 0 1 1 2 0
5 5 7 1 2 2 3 1
where rows k denote decreasing resolutions, and columns 1 each orientation. The watermark strengths or embedding parameters Se,ι, Sf,ι reflect very important particularities of the HVS. First, the strengths of watermark for the diagonal directions are chosen to be higher than for the vertical and horizontal ones. This is motivated by the fact that the anisotropy sensitivity of the HVS to the diagonally oriented patterns is lower than for the vertical and horizontal directions. Therefore, it makes possible to embed stronger watermark signals there. Moreover, it allows to obtain, as a result, better robustness against lossy compression (both JPEG-DCT and wavelet JPEG2000) . The lossy compression is exploiting the same property of the HVS to allocate smaller amounts of bits in the diagonal directions for the image coding. Therefore, the proposed embedding technique utilizes both information about the HVS and the quantization of lossy image coding to increase the robustness of the watermark w.
Second, the MTF of the HVS has a typical frequency dependence, as is shown in Fig. 3a (A. Jain, p. 55), with a maximum in a low frequency range and decreasing side lobes at very low and middle to high frequencies . In the case of non-adaptive watermark embedding (Fig. 3a) , the typical additive white Gaussian watermark has a uniform spectrum. A uniform increase of the watermark strength or equivalently watermark power density would violate the invisibility constraint at low frequencies. However, there still remains a lot of space for watermark embedding at the very low, middle and high frequencies below the threshold of imperceptibility . To exploit this opportunity we use the wavelet sub-band decomposition (Fig. 3b: wavelet subbands V1...V5 for a 1-dimensional example) , wherein the watermark strength could be adopted according to the local properties of the MTF (Fig. 3c) . This adaptation to the MTF is reflected in the proper choice of the embedding parameters. Se, Sf that have maxima in the corresponding frequency sub-bands k along each spatial direction 1 (Fig. 4) .
Third, the particular properties of the given image x within each sub-band k, 1 are taken into account using local watermark strength control based on the NVF, as discussed earlier. This feature has image dependent cha- racter oppositely to the previous two properties that characterize the HVS in general. Therefore, the proposed watermark embedding technique utilizes both general features of the HVS as well as local statistics of cover images x. Watermark extraction and message decoding:
A generalized block-diagram of watermark extraction is shown in Fig. 6. The embedded watermark w is first estimated 13, w from the possibly attacked stego image y'. Secondly, geometric distortions which may have occurred are retrieved and compensated 15 to obtain a rectified watermark wrec, by analyzing 14 the Fourier transform F(w) or the spectral power density magnitude |F( ) I and/or an autocorrelation function (ACF) w*w of the estimated wa- termark w. The ACF is preferably obtained by w*w= F_1(|F(W) |2) with F_1() being the inverse DFT. The tiled blocks are then detiled or averaged 16 in order to get an estimate of the embedded redundant sequence according to the maximum likelihood (ML) estimate for a Gaussian chan- nel . The cropping and translation are compensated 19 using cross-correlation 18 with the reference key- dependent watermark wref, 17. Finally, the message is decrypted 20 and decoded 21.
Watermark estimation: To estimate the watermark w a maximum a posteriori probability (MAP) estimate is used: w = argmaxføx ( \ w)- pw (w)}
«**" , (G5) wherein pw() is the probability density function of the watermark w. Assuming that the image y' and watermark w are conditionally independent identically distributed locally Gaussian, i.e. x ~ N(x, Rχ ) and w ~ N(θ, Rw ) with the covariance matrices Rx of the image x and Rw of the watermark w, where Rw also includes the effect of perceptual watermark modulation, one can determine:
Figure imgf000017_0001
where the mean values y =x are assumed to be equal and where Rx = max(θ, Ry - Rw ) is the ML-estimate of the local variance [ Rxx 2I with I=identity matrix) and R is an es¬ timated covariance matrix of the original stego image y.
An important issue is the estimation of the watermark co- variance matrix Rw in the above estimate. This can be do- ne based on the available copy of the stego image y' . However, the severe distortions due to lossy JPEG compression could destroy the information about the texture masking that was used for the watermark embedding, and a histogram modification attack could damage the relevant information about contrast sensitivity masking. Since no reliable information about the perceptual mask PM is available after these attacks, we propose to use a global estimate of the watermark strength based on the available copy of the attacked image y' . This practically means that we assume spatial stationarity of the watermark Rw = όll . To estimate a global watermark variance we use the following formula:
Figure imgf000018_0001
where ά^(τn, n) is a local variance of the stego image y in the coordinates (m,n) , for an image of size N xM . The estimate (G7) is a global mean value of the watermark variance. Obviously, other robust versions of (G7) such as a robust median estimate of the variance could be applied, as well. Determining affine gepmetrical distortions:
To determine the affine transformation applied to the image we compute |F(w) |2 from the estimated watermark w, where F(w) is the discrete FT. Due to the periodicity of the embedded information, the estimated watermark spec- trum possesses a discrete structure. Assuming that the watermark w is white noise within the block B, the spectrum of the watermark w will additionally be uniform. Therefore, |F(w) |2 shows aligned and regularly spaced peaks. For a T, xT2 -periodical watermark w , peaks will have periods Mi/Ti and M2/T2 for a 2-D FT domain of size M, xM2 . If an affine distortion was applied to the stego image y, the peaks layout will be re-scaled, rotated and/or sheared, but alignments will be preserved. Therefore, it any affine geometrical distortion can be estimated from these peaks by fitting alignments and estimating periods .
Finding the matched points between the extracted positions of local peaks in the magnitude spectrum of the estimated watermark (zι,z ) and the reference grid (fχ,f2) computed based on the knowledge of the embedded watermark period, one can estimate the linear affine transform A using all matched points such that the next criterion is minimized:
Figure imgf000019_0001
Figure imgf000019_0002
where {} is a negative log-likelihood function associated with the distribution of the misaliments and k is a number of matched points. In the most common case, it is assumed that the misalignment distribution is Gaussian, and one receives a quadratic log-likelihood function mi2 and the corresponding mean square error minimization criterion. In the more general case, the above problem could be solved based on the theory of robust M- estimators, if some ambiguity about misalignment distribution exists.
Fig. 7a-7d show peaks extracted from the magnitude spectrum of the watermark |F(w) |2. In Fig. 7a, the real embedded watermark w is shown that was calculated by subtracting y-x using the knowledge of the cover image x in a non-oblivious approach, whereas in Fig. 7b the Wiener predicted watermark w is taken. Therefore, these peaks can be extracted from the stego data with high fidelity based on the estimated watermark w without knowledge of the cover image x. This important conclusion is also connected with the observation that the embedded watermark w is mostly allocated in the middle frequency band. This has double importance. First, low frequencies of the stego image y or y' are not altered considerably in order not to produce visible distortions. Second, the watermark w will resist against lossy compression that removes mostly high frequency components from the image y or y' . Fig. 7c-7d show peaks extracted after lossy compression, without (Fig. 7c) and with (Fig. 7d) geometric distortions, here a 37° rotation of the stego image y' followed by a JPEG compression with a quality factor QF=50%. In experiments peaks could be properly extracted from JPEG compressed images with a quality factor QF up to 50. At the time of patent submission, no known watermarking method is able to resist to affine transforms combined with such a compression.
Recovering translation and cropping is based on the refe- rence key-dependent watermark wref, 17 (Fig. 6) . To reduce computational complexity and using the information about the periodicity of the watermark w we first perform watermark detiling 16, i.e. coherent summation of the estimated watermark w from different periods. This results in the symmetric block B' that is converted to the final block B of size N^N, . The block B is correlated 18 with the reference watermark wre . The maximum of cross- correlation 18 makes possible to establish the undergone translation or cropping that is easily compensated 19. Message decoding:
Assuming that attack, prediction and extraction errors could be modeled as additive Gaussian, the detector is designed using the ML formulation for the detection of a known signal (projection sets p are known due to the key) in Gaussian noise, that results in a correlator detector r = (^ P) . ( G9 )
In more general cases, the detector should be designed for stationary non-Gaussian noise or for the non- stationary Gaussian case. Finally, given an observation vector r , the decoder that minimizes the conditional probability of error, assuming that all codewords b are equi-probable, is given by the ML decoder: b = argmax p[r \ b , x) b . (G10)
Based on the central limit theorem (CLT) most researchers assume that the observed vector r can be accurately ap- proximated as the output of an additive Gaussian channel noise for a large sample space.
We use symbol-by-symbol MAP decoder for the turbo code that is commonly known as a BCJR decoder, a log-MAP or a max-log-MAP decoder, i.e. soft decoding, that is known to be superior in comparison with the hard decoding for Gaussian channels.
While there are shown and described presently preferred embodiments of the invention, it is to be distinctly un- derstood that the invention is not limited thereto but may be otherwise variously embodied and practiced within the scope of the following claims.

Claims

1. A method for embedding a digital watermark w in an image x, comprising the steps of a) encoding (1) a digital message b in a codeword c, b) mapping (2) the codeword c and allocating (4) the mapped codeword c into a block B, c) producing (7) a symmetric block B' by flipping and copying the block B once in every block direction, d) tiling (8) the symmetric block B' in order to ge- nerate a periodic symmetric digital watermark w and e) embedding the watermark w in the image x in order to obtain a stego image y.
2. The method according to claim 1, comprising, between steps b) and c) , the step or steps of a) adding (5) a secret-key-dependent reference watermark wref to the block B in remaining orthogonal spatial locations of the block B and/or b) up-sampling (6) pixels of the block B at least twofold in each block dimension.
3. The method according to one of the claims 1-2, comprising the steps of a) using a turbo code or a low-density parity check code for encoding (1) the digital message b and/or b) using a secret encryption key for encrypting (3) the codeword c and/or a secret block allocation key for block allocation (4) and/or f) embedding the watermark w in the image x in wavelet sub-bands (k,l) .
4. A method for embedding a watermark w in an image x, in particular according to one of the previous claims, comprising the steps of a) calculating by a discrete wavelet transform (DWT, 9, 10) image wavelet components xk:l {i, j) of the image x and watermark wavelet components wk l {i, j) of the watermark w, for pixel locations (i,j) and wavelet sub-band indices k, 1, b) based on the image wavelet components xk (i, j) calculating a noise visibility function NVFk,ι(i,j) in the wavelet sub-bands (k,l) and therefrom a perceptual mask PMk,ι(i,j) (11) for masking the watermark wavelet components wk l (i, j) and c) embedding the masked watermark wavelet components into the image wavelet components xk ι (i, j) to produce stego image wavelet components ykj{i, j) and calculating by an inverse discrete wavelet transformation (IDWT, 12) the stego image y.
5. The method according to claim 4, comprising the steps of a) calculating the noise visibility function
NVFk,ι (i, j ) from a stationary generalized Gaussian model or a non-stationary Gaussian model of the image x and/or b) based on the noise visibility function NVFk,ι(i,j) calculating a perceptual mask (11)
PMk,ι(i/D) = (l-NVFk,ι(i, j) ) . Se k/1 + NVFk,ι (i , j ) ) . Sf k,ι> wherein
Figure imgf000023_0001
are watermark strengths for edges and textures and Sf k,ι are watermark strengths for flat regions of the image x, and/or c) calculating the stego image wavelet components yk i}, j) according to an embedding rule yk,ι (Ϊ. j) = **./ (*'. j) + PMk,i ( i j ) • ww (i, j) .
6. The method according to one of the claims 4-5, comprising the steps of watermark weigthing in the wave- let sub-bands (k,l) by watermark strengths Se k,ι for edges and textures and/or by watermark strengths S k,ι for flat regions of the image x in order to exploit a frequency-dependent modulation transfer function (MTF) and/or a spatial orientational dependence of the human visual system (HVS) .
7. The method according to claim 6, comprising the steps of a) choosing the watermark strengths
Figure imgf000024_0001
for edges and textures larger than the watermark strengths Sfk,ι for flat regions for a majority of or all wavelet sub-band indices k, 1 and/or b) adapting the watermark strengths Se k,χ, Sf k,ι as a function of the wavelet sub-band index k in an inverse relation to a modulation transfer function (MTF) of the human visual system (HVS) and/or c) choosing the watermark strengths
Figure imgf000024_0002
Sfk,ι as a function of the wavelet sub-band index 1 larger for a diagonal orientation (1=3) than for a horizontal (1=1) or vertical (1=2) orientation.
8. The method according to one of the previous claims, comprising the step of subjecting the image x to a compression scheme in wavelet sub-bands k, 1, in particular to JPEG2000 compression, before the embedding of the digital watermark w.
9. A method for extracting a watermark w from a possibly attacked stego image y' , wherein an original stego image y was obtained by embedding the watermark w in an image x according to one of the claims 1-3 and in particular according to one of the claims 4-7, com- prising the steps of a) calculating (13) an estimated watermark from the stego image y' , b) detiling (16) the estimated watermark into the symmetric block B' by summing corresponding porti- ons of a plurality of periods of the estimated watermark w and converting the symmetric block B' into the block B and c) extracting (20, 21) the digital message b from the block B.
10. The method according to claim 9, comprising the steps of a) using a maximum a posteriori probability (MAP estimation) for calculating the estimated water- mark w and b) in particular using an approximate equation
Figure imgf000025_0001
wherein Rw is a watermark-covariance matrix, Rχ is an estimated image-covariance matrix, and "y are mean values of the stego image y' .
11. The method according to claim 10, comprising the steps of a) estimating a watermark-covariance matrix Rw globally by averaging local variances σY' 2(m,n) of the stego image y' over spatial coordinates (m,n) and/or b) estimating an image-covariance matrix Rx locally from max(0, R - Rw ) , wherein Ry is an estimated co- variance matrix of the original stego image y ba- sed on a maximum likelihood estimate, Rw is a watermark-covariance matrix and max() defines a maximum of its arguments.
12. The method according to one of the claims 9-11, comprising the steps of a) calculating (14) a spectral power density |F(w) |2 of the estimated watermark w, wherein F(w) is a discrete Fourier transform (DFT) , and/or calculating an autocorrelation function (ACF) w*w of the estimated watermark w, b) extracting peaks from the spectral power density |F(w) I2 and/or from the autocorrelation function (ACF) w*w, c) based on the peaks estimating coefficients of a geometric affine transform matrix A and compensa- ting (15) geometrical distortions in the estimated watermark w to obtain a rectified estimated watermark wrec for detiling (16) and further processing.
13. The method according to one of the claims 9-12, comprising the steps of a) generating (17) a reference watermark wrΘf using a secret reference watermark key and cross- correlating (18) the reference watermark wrβf with the block B for identifying and compensating in the block B translations and/or cropping undergone by the stego image y' and/or b) averaging identical neighbouring pixels in case of a previously up-sampled block B.
14. The method according to one of the claims 9-13, comprising the steps of a) using a secret block allocation key for extracting a codeword c from the block B and/or b) using a secret encryption key for decrypting (20) a codeword c of the digital message b and/or c) in case of a digital message b having been encoded with a turbo code, using a BJCR, a log-MAP or a max-log-MAP decoder for soft decoding (21) the digital message b.
PCT/IB2000/001089 2000-08-03 2000-08-03 Method for adaptive digital watermarking robust against geometric transforms WO2002013138A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2000260104A AU2000260104A1 (en) 2000-08-03 2000-08-03 Method for adaptive digital watermarking robust against geometric transforms
PCT/IB2000/001089 WO2002013138A1 (en) 2000-08-03 2000-08-03 Method for adaptive digital watermarking robust against geometric transforms

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2000/001089 WO2002013138A1 (en) 2000-08-03 2000-08-03 Method for adaptive digital watermarking robust against geometric transforms

Publications (1)

Publication Number Publication Date
WO2002013138A1 true WO2002013138A1 (en) 2002-02-14

Family

ID=11003958

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2000/001089 WO2002013138A1 (en) 2000-08-03 2000-08-03 Method for adaptive digital watermarking robust against geometric transforms

Country Status (2)

Country Link
AU (1) AU2000260104A1 (en)
WO (1) WO2002013138A1 (en)

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003032254A1 (en) * 2001-10-04 2003-04-17 Universite De Geneve Digital watermarking method robust against local and global geometrical distortions and projective transforms
US6631198B1 (en) 2000-06-19 2003-10-07 Digimarc Corporation Perceptual modeling of media signals based on local contrast and directional edges
US6975745B2 (en) 2001-10-25 2005-12-13 Digimarc Corporation Synchronizing watermark detectors in geometrically distorted signals
US6988202B1 (en) 1995-05-08 2006-01-17 Digimarc Corporation Pre-filteriing to increase watermark signal-to-noise ratio
US7076082B2 (en) 2000-12-18 2006-07-11 Digimarc Corporation Media signal filtering for use in digital watermark reading
US7088844B2 (en) 2000-06-19 2006-08-08 Digimarc Corporation Perceptual modeling of media signals based on local contrast and directional edges
US7231061B2 (en) 2002-01-22 2007-06-12 Digimarc Corporation Adaptive prediction filtering for digital watermarking
US7412072B2 (en) 1996-05-16 2008-08-12 Digimarc Corporation Variable message coding protocols for encoding auxiliary data in media signals
CN100534182C (en) * 2003-03-06 2009-08-26 汤姆森许可贸易公司 Method for coding video image considering portion related to component of motion vector
US7886151B2 (en) 2002-01-22 2011-02-08 Purdue Research Foundation Temporal synchronization of video and audio signals
CN102129660A (en) * 2011-03-24 2011-07-20 浙江工商大学 Raster graphic characteristic-based wavelet domain zero-watermarking method
CN102142130A (en) * 2011-04-11 2011-08-03 西安电子科技大学 Watermark embedding method and device based on wavelet-domain enhanced image masks
WO2015030894A3 (en) * 2013-06-20 2015-04-23 Verance Corporation Stego key management
US9117270B2 (en) 1998-05-28 2015-08-25 Verance Corporation Pre-processed information embedding system
US9153006B2 (en) 2005-04-26 2015-10-06 Verance Corporation Circumvention of watermark analysis in a host content
US9189955B2 (en) 2000-02-16 2015-11-17 Verance Corporation Remote control signaling using audio watermarks
CN105096234A (en) * 2015-07-30 2015-11-25 北京工业大学 Hyperspectral image encryption method based on hybrid domain
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9355438B2 (en) 2014-01-15 2016-05-31 Infosys Limited Systems and methods for correcting geometric distortions in videos and images
US9596521B2 (en) 2014-03-13 2017-03-14 Verance Corporation Interactive content acquisition using embedded codes
CN109584139A (en) * 2019-01-25 2019-04-05 中国科学技术大学 Method is securely embedded suitable for batch adaptive steganography
CN109712059A (en) * 2018-12-27 2019-05-03 辽宁师范大学 Digital watermark detection method based on multi-scale joint statistical modeling
CN109727178A (en) * 2018-12-27 2019-05-07 辽宁师范大学 Robust image watermarking method in NSST domain based on multivariate BKF parameter correction
CN109727177A (en) * 2018-12-27 2019-05-07 辽宁师范大学 Embedding and Extracting Method of Digital Watermark Based on Stable Difference Multi-correlation Cauchy Marginal Distribution
CN109903215A (en) * 2019-04-08 2019-06-18 上海理工大学 Wavelet Coefficient Adjustment Watermarking Method Based on Modulo Operation
CN110189241A (en) * 2019-04-26 2019-08-30 江苏信实云安全技术有限公司 A kind of anti-printing noise image water mark method based on block mean value
CN110458745A (en) * 2018-05-08 2019-11-15 天津科技大学 A Digital Watermarking Algorithm Based on Information Fusion and Information Compensation
CN110782384A (en) * 2019-10-31 2020-02-11 华北水利水电大学 A Blind Image Watermarking Method in Wavelet Domain Based on Binarized Computational Correlation Imaging
CN111223034A (en) * 2019-11-14 2020-06-02 中山大学 Large-capacity anti-printing/photography blind watermarking system and method based on deep learning
CN111445374A (en) * 2018-12-29 2020-07-24 北京奇虎科技有限公司 Watermark template generation method and device for embedding hidden digital watermark into image
CN111598761A (en) * 2020-04-17 2020-08-28 中山大学 A digital watermarking method based on image noise reduction for anti-print shooting images
CN112132737A (en) * 2020-10-12 2020-12-25 中国人民武装警察部队工程大学 A Robust Steganography Method for Image Generation Without Reference
CN112866820A (en) * 2020-12-31 2021-05-28 宁波大学科学技术学院 Robust HDR video watermark embedding and extracting method and system based on JND model and T-QR and storage medium
CN113313621A (en) * 2021-04-15 2021-08-27 长城信息股份有限公司 Digital image encryption watermark embedding method, digital image encryption watermark extracting method and digital image encryption watermark extracting device based on hybrid chaotic system and closed loop diffusion
CN113989093A (en) * 2021-10-28 2022-01-28 金陵科技学院 A digital watermarking method for vector geographic data against rotation attack
CN114140308A (en) * 2021-11-30 2022-03-04 南开大学 Image blind watermarking method based on reversible neural network
CN114268845A (en) * 2021-12-21 2022-04-01 中国电影科学技术研究所 A real-time watermarking method for 8K ultra-high-definition video based on heterogeneous computing
CN114841846A (en) * 2022-05-18 2022-08-02 南京信息工程大学 Self-coding color image robust watermark processing method based on visual perception
CN119692724A (en) * 2025-02-24 2025-03-25 浙江广川工程咨询有限公司 A method and system for periodic optimization scheduling of water conservancy hub

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997043736A1 (en) * 1996-05-16 1997-11-20 Digimarc Corporation Computer system linked by using information in data objects

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997043736A1 (en) * 1996-05-16 1997-11-20 Digimarc Corporation Computer system linked by using information in data objects

Cited By (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6988202B1 (en) 1995-05-08 2006-01-17 Digimarc Corporation Pre-filteriing to increase watermark signal-to-noise ratio
US7412072B2 (en) 1996-05-16 2008-08-12 Digimarc Corporation Variable message coding protocols for encoding auxiliary data in media signals
US7778442B2 (en) 1996-05-16 2010-08-17 Digimarc Corporation Variable message coding protocols for encoding auxiliary data in media signals
US8094877B2 (en) 1996-05-16 2012-01-10 Digimarc Corporation Variable message coding protocols for encoding auxiliary data in media signals
US9117270B2 (en) 1998-05-28 2015-08-25 Verance Corporation Pre-processed information embedding system
US9189955B2 (en) 2000-02-16 2015-11-17 Verance Corporation Remote control signaling using audio watermarks
US7088844B2 (en) 2000-06-19 2006-08-08 Digimarc Corporation Perceptual modeling of media signals based on local contrast and directional edges
US7483547B2 (en) 2000-06-19 2009-01-27 Digimarc Corporation Perceptual modeling of media signals for data hiding
US6631198B1 (en) 2000-06-19 2003-10-07 Digimarc Corporation Perceptual modeling of media signals based on local contrast and directional edges
US7822226B2 (en) 2000-06-19 2010-10-26 Digimarc Corporation Perceptual modeling of media signals for data hiding
US7076082B2 (en) 2000-12-18 2006-07-11 Digimarc Corporation Media signal filtering for use in digital watermark reading
WO2003032254A1 (en) * 2001-10-04 2003-04-17 Universite De Geneve Digital watermarking method robust against local and global geometrical distortions and projective transforms
US7664288B2 (en) 2001-10-04 2010-02-16 Universite De Geneve Digital watermarking method robust against local and global geometric distortions and projective transforms
US6975745B2 (en) 2001-10-25 2005-12-13 Digimarc Corporation Synchronizing watermark detectors in geometrically distorted signals
US7886151B2 (en) 2002-01-22 2011-02-08 Purdue Research Foundation Temporal synchronization of video and audio signals
US7688996B2 (en) 2002-01-22 2010-03-30 Digimarc Corporation Adaptive prediction filtering for digital watermarking
US7231061B2 (en) 2002-01-22 2007-06-12 Digimarc Corporation Adaptive prediction filtering for digital watermarking
US8315427B2 (en) 2002-01-22 2012-11-20 Digimarc Corporation Adaptive prediction filtering for encoding/decoding digital signals in media content
CN100534182C (en) * 2003-03-06 2009-08-26 汤姆森许可贸易公司 Method for coding video image considering portion related to component of motion vector
US9153006B2 (en) 2005-04-26 2015-10-06 Verance Corporation Circumvention of watermark analysis in a host content
CN102129660A (en) * 2011-03-24 2011-07-20 浙江工商大学 Raster graphic characteristic-based wavelet domain zero-watermarking method
CN102142130A (en) * 2011-04-11 2011-08-03 西安电子科技大学 Watermark embedding method and device based on wavelet-domain enhanced image masks
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
WO2015030894A3 (en) * 2013-06-20 2015-04-23 Verance Corporation Stego key management
US9485089B2 (en) 2013-06-20 2016-11-01 Verance Corporation Stego key management
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
US9355438B2 (en) 2014-01-15 2016-05-31 Infosys Limited Systems and methods for correcting geometric distortions in videos and images
US9596521B2 (en) 2014-03-13 2017-03-14 Verance Corporation Interactive content acquisition using embedded codes
CN105096234A (en) * 2015-07-30 2015-11-25 北京工业大学 Hyperspectral image encryption method based on hybrid domain
CN110458745A (en) * 2018-05-08 2019-11-15 天津科技大学 A Digital Watermarking Algorithm Based on Information Fusion and Information Compensation
CN109727177B (en) * 2018-12-27 2023-05-23 辽宁师范大学 Digital watermark embedding and extraction method based on stable difference multi-correlation Cauchy marginal distribution
CN109727178A (en) * 2018-12-27 2019-05-07 辽宁师范大学 Robust image watermarking method in NSST domain based on multivariate BKF parameter correction
CN109727177A (en) * 2018-12-27 2019-05-07 辽宁师范大学 Embedding and Extracting Method of Digital Watermark Based on Stable Difference Multi-correlation Cauchy Marginal Distribution
CN109712059A (en) * 2018-12-27 2019-05-03 辽宁师范大学 Digital watermark detection method based on multi-scale joint statistical modeling
CN109727178B (en) * 2018-12-27 2023-05-09 辽宁师范大学 Robust image watermarking method in NSST domain based on multivariate BKF parameter correction
CN109712059B (en) * 2018-12-27 2023-04-14 辽宁师范大学 Digital watermark detection method based on multi-scale joint statistical modeling
CN111445374A (en) * 2018-12-29 2020-07-24 北京奇虎科技有限公司 Watermark template generation method and device for embedding hidden digital watermark into image
CN109584139A (en) * 2019-01-25 2019-04-05 中国科学技术大学 Method is securely embedded suitable for batch adaptive steganography
CN109584139B (en) * 2019-01-25 2022-10-28 中国科学技术大学 Safety embedding method suitable for batch self-adaptive steganography
CN109903215A (en) * 2019-04-08 2019-06-18 上海理工大学 Wavelet Coefficient Adjustment Watermarking Method Based on Modulo Operation
CN110189241A (en) * 2019-04-26 2019-08-30 江苏信实云安全技术有限公司 A kind of anti-printing noise image water mark method based on block mean value
CN110189241B (en) * 2019-04-26 2023-01-31 江苏水印科技有限公司 Block mean value-based anti-printing noise image watermarking method
CN110782384A (en) * 2019-10-31 2020-02-11 华北水利水电大学 A Blind Image Watermarking Method in Wavelet Domain Based on Binarized Computational Correlation Imaging
CN110782384B (en) * 2019-10-31 2023-04-07 华北水利水电大学 Wavelet domain image blind watermarking method based on binaryzation calculation correlation imaging
CN111223034A (en) * 2019-11-14 2020-06-02 中山大学 Large-capacity anti-printing/photography blind watermarking system and method based on deep learning
CN111223034B (en) * 2019-11-14 2023-04-28 中山大学 Large-capacity anti-printing/photography blind watermarking system and method based on deep learning
CN111598761B (en) * 2020-04-17 2023-11-17 中山大学 Anti-printing shooting image digital watermarking method based on image noise reduction
CN111598761A (en) * 2020-04-17 2020-08-28 中山大学 A digital watermarking method based on image noise reduction for anti-print shooting images
CN112132737A (en) * 2020-10-12 2020-12-25 中国人民武装警察部队工程大学 A Robust Steganography Method for Image Generation Without Reference
CN112132737B (en) * 2020-10-12 2023-11-07 中国人民武装警察部队工程大学 A robust image steganography method without reference generation
CN112866820A (en) * 2020-12-31 2021-05-28 宁波大学科学技术学院 Robust HDR video watermark embedding and extracting method and system based on JND model and T-QR and storage medium
CN112866820B (en) * 2020-12-31 2022-03-08 宁波大学科学技术学院 Robust HDR video watermark embedding and extracting method and system based on JND model and T-QR and storage medium
CN113313621B (en) * 2021-04-15 2022-06-28 长城信息股份有限公司 Image encryption watermark embedding method based on hybrid chaotic system and closed-loop diffusion
CN113313621A (en) * 2021-04-15 2021-08-27 长城信息股份有限公司 Digital image encryption watermark embedding method, digital image encryption watermark extracting method and digital image encryption watermark extracting device based on hybrid chaotic system and closed loop diffusion
CN113989093A (en) * 2021-10-28 2022-01-28 金陵科技学院 A digital watermarking method for vector geographic data against rotation attack
CN113989093B (en) * 2021-10-28 2024-04-26 金陵科技学院 Digital watermarking method for vector geographic data against rotation attack
CN114140308A (en) * 2021-11-30 2022-03-04 南开大学 Image blind watermarking method based on reversible neural network
CN114268845A (en) * 2021-12-21 2022-04-01 中国电影科学技术研究所 A real-time watermarking method for 8K ultra-high-definition video based on heterogeneous computing
CN114268845B (en) * 2021-12-21 2024-02-02 中国电影科学技术研究所 Real-time watermarking method of 8K ultra-high definition video based on heterogeneous operation
CN114841846A (en) * 2022-05-18 2022-08-02 南京信息工程大学 Self-coding color image robust watermark processing method based on visual perception
CN119692724A (en) * 2025-02-24 2025-03-25 浙江广川工程咨询有限公司 A method and system for periodic optimization scheduling of water conservancy hub

Also Published As

Publication number Publication date
AU2000260104A1 (en) 2002-02-18

Similar Documents

Publication Publication Date Title
WO2002013138A1 (en) Method for adaptive digital watermarking robust against geometric transforms
Voloshynovskiy et al. Content adaptive watermarking based on a stochastic multiresolution image modeling
Lin et al. A blind watermarking method using maximum wavelet coefficient quantization
Pereira et al. Optimal transform domain watermark embedding via linear programming
Alzahrani et al. Blind and robust watermarking scheme in hybrid domain for copyright protection of medical images
Voloshynovskiy et al. Attack modelling: towards a second generation watermarking benchmark
Kang et al. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
Mohan et al. A robust image watermarking scheme using singular value decomposition.
Kalantari et al. A robust image watermarking in the ridgelet domain using universally optimum decoder
Lin et al. Wavelet-based copyright-protection scheme for digital images based on local features
Chen et al. A simple and efficient watermark technique based on JPEG2000 codec
US20060120558A1 (en) System and method for lossless data hiding using the integer wavelet transform
Maity et al. Robust and Blind Spatial Watermarking In Digital Image.
WO2002019269A2 (en) A method for encoding and decoding image dependent watermarks
Solanki et al. Robust image-adaptive data hiding: Modeling, source coding and channel coding
Terzija et al. Digital image watermarking using complex wavelet transform
Su et al. Synchronized detection of the block-based watermark with invisible grid embedding
Li et al. Blind image watermarking scheme based on wavelet tree quantization robust to geometric attacks
Chen et al. A Robust Wavelet Based Watermarking Scheme using Quantization and Human Visual System Model
Al-Taweel et al. Robust video watermarking based on 3D-DWT domain
Pareek et al. Discrete cosine transformation based image watermarking for authentication and copyright protection
Joshi et al. Efficient dual domain watermarking scheme for secure images
Chang et al. Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments
Hien et al. ICA-based robust logo image watermarking
Nguyen A watermark algorithm against de-synchronization attacks

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP