Analysis of feature-based geometry invariant watermarking

被引:12
|
作者
Celik, MU [1 ]
Saber, E [1 ]
Sharma, G [1 ]
Tekalp, AM [1 ]
机构
[1] Univ Rochester, Rochester, NY 14627 USA
关键词
watermarking; geometry invariance; feature extraction; registration; warping;
D O I
10.1117/12.435407
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring robustness against geometrical manipulations is a challenging task for watermarking algorithms. Watermarking algorithms that depend on the inherent geometry of the image for synchronization fail ungracefully due to de-synchronization through geometric manipulations. A class of algorithms tries to overcome this problem using feature-based synchronization markers. These are essentially composed of three building blocks: feature point extraction, elementary patch formation and registration to a standard geometry, and watermarking of elementary patches. Extracted feature points are bound to the image content, thus may be used as robust synchronization markers. This set of points is used to divide the image into elementary patches, which are warped into a standard geometry ensuring the exact synchronization during insertion and extraction. Once the synchronization is provided, any watermarking technique may reliably operate on elementary patches. In this paper, we present an analysis of feature-based geometry invariant watermarking algorithms. A discussion of the requirements on each building block is followed by potential solutions to meet these requirements. Furthermore, we present theoretical and practical limitations of these solutions via examples. In particular, segmentation based feature point extractors and triangulation based elementary patch formations are evaluated.
引用
收藏
页码:261 / 268
页数:8
相关论文
共 50 条
  • [41] Arabic Feature-Based Text Watermarking Technique for Sensitive Detecting Tampering Attack
    Al-Wesabi, Fahd N.
    Iskandar, Huda G.
    Alzahrani, Saleh
    Abdelmaboud, Abdelzahir
    Abdul, Mohammed
    Nemri, Nadhem
    Medani, Mohammad
    Alghamdi, Mohammed Y.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (03): : 3789 - 3806
  • [42] Feature-based watermarking scheme for MPEG-I/II video authentication
    Dai, YW
    Thiemert, S
    Steinebach, M
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 325 - 335
  • [43] A feature-based robust digital image watermarking scheme using bandelet transform
    Niu, Pan-Pan
    Wang, Xiang Yang
    Jin, Hai-Bo
    Lu, Ming-Yu
    OPTICS AND LASER TECHNOLOGY, 2011, 43 (03): : 437 - 450
  • [44] Local Invariant Feature-Based Gender Recognition from Facial Images
    Verma, Vivek Kumar
    Srivastava, Sumit
    Jain, Tarun
    Jain, Ashish
    SOFT COMPUTING FOR PROBLEM SOLVING, 2019, 817 : 869 - 878
  • [45] Improved tracking of multiple vehicles using invariant feature-based matching
    Choi, Jae-Young
    Choi, Jin-Woo
    Yang, Young-Kyu
    PATTERN RECOGNITION AND MACHINE INTELLIGENCE, PROCEEDINGS, 2007, 4815 : 649 - 656
  • [46] Robust image watermarking using feature based local invariant regions
    Li, Lei-Da
    Guo, Bao-Long
    Pan, Jeng-Shyang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (08): : 1977 - 1986
  • [47] Geometrically Invariant Image Watermarking Based on Feature Extraction and Zernike Transform
    Yuan, Xiao-Chen
    Pun, Chi-Man
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 217 - 222
  • [48] Feature extraction and local Zernike moments based geometric invariant watermarking
    Yuan, Xiao-Chen
    Pun, Chi-Man
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (01) : 777 - 799
  • [49] Geometrically invariant object-based watermarking using sift feature
    Pham, Viet Quoc
    Miyaki, Takashi
    Yamasaki, Toshihiko
    Aizawa, Kiyoharu
    2007 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-7, 2007, : 2725 - +
  • [50] Image Watermarking Scheme Based on Scale-Invariant Feature Transform
    Lyu, Wan-Li
    Chang, Chin-Chen
    Thai-Son Nguyen
    Lin, Chia-Chen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (10): : 3591 - 3606