DOI QR코드

DOI QR Code

Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing

  • Mingfang Jiang (School of Computer Science, Hunan First Normal University) ;
  • Hengfu Yang ( Hunan Provincial Key Laboratory of Informationization Technology in Elementary Education, Hunan First Normal University)
  • Received : 2023.02.14
  • Accepted : 2023.03.21
  • Published : 2023.12.31

Abstract

To effectively track the illegal use of digital images and maintain the security of digital image communication on the Internet, this paper proposes a reversible multipurpose image watermarking algorithm based on a deep residual network (ResNet) and perceptual hashing (also called MWR). The algorithm first combines perceptual image hashing to generate a digital fingerprint that depends on the user's identity information and image characteristics. Then it embeds the removable visible watermark and digital fingerprint in two different regions of the orthogonal separation of the image. The embedding strength of the digital fingerprint is computed using ResNet. Because of the embedding of the removable visible watermark, the conflict between the copyright notice and the user's browsing is balanced. Moreover, image authentication and traitor tracking are realized through digital fingerprint insertion. The experiments show that the scheme has good visual transparency and watermark visibility. The use of chaotic mapping in the visible watermark insertion process enhances the security of the multipurpose watermark scheme, and unauthorized users without correct keys cannot effectively remove the visible watermark.

Keywords

Acknowledgement

This work was supported in part by the Social Science Foundation of Hunan Province (No. 19YBA098).

References

  1. P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE transactions on image processing, vol. 10, no. 10, pp. 1593-1601, 2001. https://doi.org/10.1109/83.951543 
  2. F. Y. Shih and S. Y. Wu, "Combinational image watermarking in the spatial and frequency domains," Pattern Recognition, vol. 36, no. 4, pp. 969-975, 2003. https://doi.org/10.1016/S0031-3203(02)00122-X 
  3. S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, "Attack modelling: towards a second generation watermarking benchmark," Signal Processing, vol. 81, no. 6, pp. 1177-1214, 2001. https://doi.org/10.1016/S0165-1684(01)00039-1 
  4. C. S. Lu, H. Y. M. Liao, and L. H. Chen, "Multipurpose audio watermarking," in Proceedings 15th International Conference on Pattern Recognition (ICPR), Barcelona, Spain, 2000, pp. 282-285. https://doi.org/10.1109/ICPR.2000.903540 
  5. B. Lei and I. Y. Soon, "A multipurpose audio watermarking algorithm with synchronization and encryption," Journal of Zhejiang University (SCIENCE C), vol. 13, pp. 11-19, 2012. https://doi.org/10.1631/jzus.C1100085 
  6. Y. Peng, H. Lan, M. Yue, and Y. Xue, "Multipurpose watermarking for vector map protection and authentication," Multimedia Tools and Applications, vol. 77, pp. 7239-7259, 2018. https://doi.org/10.1007/s11042-017-4631-z 
  7. S. Sheidani and Z. Eslami, "Blind multipurpose watermarking with insertion of a single watermark: a generic construction based on verifiable threshold secret sharing," IET Image Processing, vol. 14, no. 17, pp. 4766-4773, 2020. https://doi.org/10.1049/iet-ipr.2019.1576 
  8. F. Chaabane, M. Charfeddine, W. Puech, and C. B. Amar, "A two-stage traitor tracing scheme for hierarchical fingerprints," Multimedia Tools and Applications, vol. 76, pp. 14405-14435, 2017. https://doi.org/10.1007/s11042-016-3749-8 
  9. University of Southern California, "The USC-SIPI image database," c2023 [Online]. Available: https://sipi.usc.edu/database/. 
  10. H. Yang, J. Yin, and Y. Yang, "Robust image hashing scheme based on low-rank decomposition and path integral LBP," IEEE Access, vol. 7, pp. 51656-51664, 2019. https://doi.org/10.1109/ACCESS.2019.2911207 
  11. L. Zhang and H. Wu, "Cosaliency detection and region-of-interest extraction via manifold ranking and MRF in remote sensing images," IEEE Transactions on Geoscience and Remote Sensing, vol. 60, pp. 1-17, 2022. https://doi.org/10.1109/TGRS.2021.3079441
  12. Z. Rahman, X. Yi, M. Billah, M. Sumi, and A. Anwar, "Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home," Electronics, vol. 11, no. 7, article no. 1083, 2022. https://doi.org/10.3390/electronics11071083 
  13. Y. Yang, X. Sun, H. Yang, and C. T. Li, "Removable visible image watermarking algorithm in the discrete cosine transform domain," Journal of Electronic Imaging, vol. 17, no. 3, article no. 033008, 2008. https://doi.org/10.1117/1.2952843