[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

An Anti-cropping Watermarking Method for Facial Images Using Prediction and Weber Ratio Techniques

Published: 01 November 2015 Publication History

Abstract

When a digital facial image is published in any social network, often the facial part of the image is cropped and abused without the owner permission. It is extremely difficult to verify the owner, especially in cases where the embedded watermark does not cover the cropped face part. This paper proposes a digital image watermarking method that is robust against cropping attack in the spatial domain for protecting the copyright of facial images. The face region in an image is evaluated by using phase correlation technique for embedding the watermark. A binary watermark is defined to be embedded in the facial region. Pixels for embedding the watermark are predicted and altered based on the Weber ratio to control the strength of the watermark in order to make it imperceptible to the human eye. The watermark is extracted from the watermarked image that does not require the original image by subtracting the watermarked pixel from its predicted pixel. After this, the pieces of the extracted watermarks are verified to measure their similarity with the original watermark. The experimental results show that our method yielded 82 % similarity with the original watermark image, when it was attacked by the cropping attacks for any shapes, sizes, locations and the JPEG compression.

References

[1]
Cox, I. J., Kilian, I., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing,6(12), 1673---1687.
[2]
Xia, X. G, Boncelet, C. G., & Arce, G. R. (1997). A multiresolution watermark for digital images. In IEEE international conference on image processing (Vol. 1, pp. 548---551).
[3]
Inoue, H., Miyazaki, A., & Katsura, T. (1999). An image watermarking method based on the wavelet transform. In IEEE international conference on image processing (Vol. 1, pp. 296---300).
[4]
Ni, R., &Ruan, Q. (2006, September). Region of interest watermarking based on fractal dimension. In The 18th international conference on pattern recognition (Vol. 3, pp. 934---937).
[5]
Phiasai, T., Kumhom, P., & Chamnongthai, K. (2004, October 26---29). A digital image watermarking technique using prediction method and weber ratio. In IEEE international symposium on communications and information technologies (Vol. 1, pp. 314---317).
[6]
Phadikar, A., Maity, S. P., & Rahaman, H. (2009, March 6---7). Region specific spatial domain image watermarking scheme. In IEEE international advance computing conference (pp. 888---893).
[7]
Nikolaidis, A., & Pitas, I. (2001). Region-based image watermarking. IEEE Transactions on Image Processing,10(11), 1726---1740.
[8]
Phiasai, T., Kumhom, P., & Chamnongthai, K. (2003, July). A method for reconstructing watermark from cropped watermarked image. In ITC CSCC (Vol. 1, pp. 108---111).
[9]
Abdullatif, M., Zeki, A. M., Chebil, J., & Gunawan, T. S. (2013, March 8---10). Properties of digital image watermarking. In IEEE 9th international colloquium on signal processing and its applications (pp. 235---240).
[10]
Nin, J., & Ricciardi, S. (2013). Digital watermarking techniques and security issues in the information in the information and communication society. In International conference on advanced information networking and applications workshops (pp. 1553---1558).
[11]
Zhang, Y. (2003). Digital watermarking technology: A review. In International conference on future computer and communication (pp. 250---252).
[12]
Lee, J. S., & Li, B. (2014). Self-recognized image protection technique that resists large-scale cropping. IEEE Multimedia,21, 60---73.
[13]
Phiasai, T., Arunrungrusmi, S., & Chamnongthai, K. (2001). Face recognition system with PCA and moment invariant method. In The 2001 IEEE international symposium on circuits and systems (ISCAS) (Vol. 2, pp. 165---168).
[14]
Li, W., & Xiang, H. Y. (2009). Face detection based on QFT phase-only correlation template match. In International conference on information science and engineering (pp. 1231---1234).
[15]
Voloshynovskiy, S., Deguillaume, F., & Pun, T. (2001). Multibit digital watermarking robust against local nonlinear geometrical distortions. In International conference on image processing (Vol. 3, pp. 999---1002).
[16]
Foroosh, H., Zerubia, J. B., & Berthod, M. (2002). Extension of phase correlation to subpixel registration. IEEE Transactions on Image Processing,11, 188---200.
[17]
Gonzalez, R. C., & Woods, R. E. (2002). Digital image processing (2nd ed.). Upper Saddle River: Prentice-Hall.

Cited By

View all
  • (2024)Methods for countering attacks on image watermarking schemesJournal of Visual Communication and Image Representation10.1016/j.jvcir.2024.10407399:COnline publication date: 1-Mar-2024
  • (2021)An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting CodeWireless Personal Communications: An International Journal10.1007/s11277-021-08666-y121:1(939-961)Online publication date: 1-Nov-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Wireless Personal Communications: An International Journal
Wireless Personal Communications: An International Journal  Volume 85, Issue 2
November 2015
256 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 November 2015

Author Tags

  1. Copyright
  2. Cropping attack
  3. Digital image watermarking
  4. Pixel prediction
  5. Weber ratio

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Methods for countering attacks on image watermarking schemesJournal of Visual Communication and Image Representation10.1016/j.jvcir.2024.10407399:COnline publication date: 1-Mar-2024
  • (2021)An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting CodeWireless Personal Communications: An International Journal10.1007/s11277-021-08666-y121:1(939-961)Online publication date: 1-Nov-2021

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media