GEOMETRICALLY INVARIANT OBJECT-BASED WATERMARKING
USING SIFT FEATURE
Viet Quoc PHAM
Takashi MIYAKI
‡
Toshihiko YAMASAKI
Kiyoharu AIZAWA
Dept. of Information and Communication Engineering Dept. of Frontier Informatics,
The University of Tokyo
E-mail: {pqvietvn, miyaki, yamasaki, aizawa }@hal.k.u-tokyo.ac.jp
ABSTRACT
In this paper, we have developed a robust object-based
watermarking algorithm using the scale-invariant feature
transform (SIFT) features in conjunction with a new data
embedding method based on Discrete Cosine Transform
(DCT). The message is embedded in DCT spaces of
randomly generated blocks in the selected object region. To
recognize the object region after being distorted, its SIFT
features are registered in advance. In the detection scheme,
we firstly detect the object region by using feature matching.
The transformation parameters are then calculated, and the
message can be detected. Experimental results demonstrated
that our proposed algorithm is very robust to geometrical
distortions such as JPEG compression, scaling, rotation,
shearing, aspect ratio change, image filtering, and so on.
Index Terms— Digital watermarking, geometrically
invariant, scale-invariant feature transform, object matching
1. INTRODUCTION
Owing to the development of the Internet, digital imaging
has experienced tremendous growth over the last decade.
We now can easily find and download a large number of
images within a few seconds. In order to protect and
preserve the owner’s right, a number of copyright protection
methods have been proposed. Digital watermarking is a
technology used for copy control and media identification
and tracing. In digital watermarking, they embed a short
message (a watermark) in an image or video without
affecting the quality but that can be detected using dedicated
analysis program.
Due to the advances in image and video editing
software, it has been made possible to copy a certain object
in an image or a frame and paste it to the others. In addition,
such illegally copied object may be geometrically distorted
by lossy compression, affine transforms, and so on. The
purpose of this paper is embedding and detecting a
watermark in such a situation. In this point of view, the
scope of this paper is different from conventional object-
based watermarking for MPEG-4, in which object layers are
pre-defined. In our case, we do not assume such predefined
object layers nor do we have to conduct object segmentation
for watermarking.
In this paper, we have developed a robust object-based
watermarking algorithm using object matching in
conjunction with a new data embedding method based on
Discrete Cosine Transform (DCT). The general idea of this
method is shown in Fig. 1. The watermarked object “akiyo”
in Fig. 1 is attacked by being mixed with another object and
then geometrically transformed. To detect the hidden
information in the object, we first detect the object region by
using object matching. And by calculating the affine
parameters, we can geometrically recover the object, and
can easily read the hidden message. In our method, we
employed the SIFT feature [1] for the object matching
operation.
The experimental results demonstrated that our method
can resist to very strong attacks such as 0.4x scaling, all
angle rotation, 30° shearing, JPEG compression (Q=20),
StirMark random distortions, or the combination of them.
2. RELATED WORKS
There are several approaches related to geometrically
invariant watermarking. We categorize them into two groups.
In the first group, the watermarking systems employ
object segmentation. As a representative of this group,
Dajun et al. [2] proposed an object-based video
authentication system in which a set of angular radial
transformation coefficients was selected as the feature to
represent the video object and the background. Error
correction coding and cryptographic hashing were applied to
those selected coefficients to generate the authentication
watermark. The watermark embedding and extraction were
done by modifying Discrete Fourier Transform (DFT)
coefficients. In their detection scheme, the scaling ratio was
supposed to be known so that the received video object
could be scaled back to its original resolution. Besides, there
are some other methods that employ object segmentation,
such as [3] [4], etc. One of the most significant
disadvantages of such methods is that object segmentation
V - 473 1-4244-1437-7/07/$20.00 ©2007 IEEE ICIP 2007