RiSw: resistant to incomplete shooting watermarking scheme

Zhouliang Wang, Wanni Xiang, Weiya Wang, Hui Li

Optoelectronics Letters ›› 2024, Vol. 20 ›› Issue (8) : 497-504. DOI: 10.1007/s11801-024-3255-6
Article

RiSw: resistant to incomplete shooting watermarking scheme

Author information +
History +

Abstract

Leaking data through screen-shooting has become the main way of modern leaks. Digital watermarking technology can trace the leaker through the watermark information after the data is leaked. The current screen-shooting watermarking scheme can resist part of the distortion in the screen-shooting process, but it faces two problems. On the one hand, the watermark capacity is small. On the other hand, when the shot watermarked image is incomplete, high watermark extraction accuracy cannot be guaranteed. Based on the above problems, we propose a resistant to incomplete shooting watermarking (RiSw) scheme. Specifically, we design a set of codecs that can embed binary images as watermarks into carrier images and extract them, which not only ensures good visual effects of watermarked image, but also greatly increases watermark capacity. To resist incomplete shooting, we propose an incomplete shooting layer to simulate the situation of incomplete shooting in the screen-shooting process. Robustness to incomplete shooting can be achieved through end-to-end training. Extensive experiments show that the scheme proposed in this paper has superior performance. Even if the watermarked image lacks 50% pixels, it can still maintain a stable extraction accuracy.

Cite this article

Download citation ▾
Zhouliang Wang, Wanni Xiang, Weiya Wang, Hui Li. RiSw: resistant to incomplete shooting watermarking scheme. Optoelectronics Letters, 2024, 20(8): 497‒504 https://doi.org/10.1007/s11801-024-3255-6

References

[[1]]
Gugelmann D, Sommer D, Lenders V, et al.. Screen watermarking for data theft investigation and attribution. 2018 10th International Conference on Cyber Conflict (CyCon), May 29–June 1, 2018, Tallinn, Estonia, 2018 New York IEEE 391-408 [C]
[[2]]
Han S, Yang J, Wang R, et al.. A robust color image watermarking algorithm against rotation attacks. Optoelectronics letters, 2018, 14(1): 61-66, J]
CrossRef Google scholar
[[3]]
Kang X, Huang J, Zeng W. Efficient general print-scanning resilient data hiding based on uniform log-polar mapping. IEEE transactions on information forensics and security, 2010, 5(1): 1-12, J]
CrossRef Google scholar
[[4]]
Nakamura T, Katayama A, Yamamuro M, et al.. Fast watermark detection scheme from camera-captured images on mobile phones. International journal of pattern recognition and artificial intelligence, 2006, 20(04): 543-564, J]
CrossRef Google scholar
[[5]]
Schaber P, Kopf S, Wetzel S, et al.. CamMark: analyzing, modeling, and simulating artifacts in camcorder copies. ACM transactions on multimedia computing, communications, and applications (TOMM), 2015, 11(2s): 1-23, J]
CrossRef Google scholar
[[6]]
Fang H, Zhang W, Zhou H, et al.. Screen-shooting resilient watermarking. IEEE transactions on information forensics and security, 2018, 14(6): 1403-1418, J]
CrossRef Google scholar
[[7]]
Fang H, Chen D, Wang F, et al.. TERA: screen-to-camera image code with transparency, efficiency, robustness and adaptability. IEEE transactions on multimedia, 2022, 24: 955-967, J]
CrossRef Google scholar
[[8]]
Fang H, Jia Z, Zhou H, et al.. Encoded feature enhancement in watermarking network for distortion in real scenes. IEEE transactions on multimedia, 2023, 25: 2648-2660, J]
CrossRef Google scholar
[[9]]
Gu W, Chang C C, Bai Y, et al.. Anti-screenshot watermarking algorithm for archival image based on deep learning model. Entropy, 2023, 25(2): 288, J]
CrossRef Google scholar
[[10]]
Ge S, Fei J, Xia Z, et al.. A screen-shooting resilient document image watermarking scheme using deep neural network. IET image processing, 2023, 17(2): 323-336, J]
CrossRef Google scholar
[[11]]
Fang H, Jia Z, Ma Z, et al.. PIMoG: an effective screen-shooting noise-layer simulation for deep-learning-based watermarking network. Proceedings of the 30th ACM International Conference on Multimedia, October 10–14, 2022, Lisboa, Portugal, 2022 New York ACM 2267-2275 [C]
[[12]]
Zhang C, Karjauv A, Benz P, et al.. Towards robust deep hiding under non-differentiable distortions for practical blind watermarking. Proceedings of the 29th ACM International Conference on Multimedia, October 20–24, 2021, Virtual, 2021 New York ACM 5158-5166 [C]
[[13]]
Zhao T, Sun Y, X, et al.. Deep learning-based channel estimation for wireless ultraviolet MIMO communication systems. Optoelectronics letters, 2024, 20(1): 35-41, J]
CrossRef Google scholar
[[14]]
Tancik M, Mildenhall B, Ng R. StegaStamp: invisible hyperlinks in physical photographs. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, June 13–19, 2020, Seattle, WA, USA, 2020 New York IEEE 2117-2126 [C]
[[15]]
Zhu J, Kaplan R, Johnson J, et al.. HiDDeN: hiding data with deep networks. Proceedings of the European Conference on Computer Vision (ECCV), September 8–14, 2018, Munich, Germany, 2018 Berlin, Heidelberg Springer 657-672 [C]
[[16]]
Liu Y, Guo M, Zhang J, et al.. A novel two-stage separable deep learning framework for practical blind watermarking. Proceedings of the 27th ACM International Conference on Multimedia, October 21–25, 2019, Nice, France, 2021 New York ACM 1509-1517 [C]
[[17]]
Jégou S, Drozdzal M, Vazquez D, et al.. The one hundred layers tiramisu: fully convolutional densenets for semantic segmentation. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, July 21–26, 2017, Honolulu, Hawaii, USA, 2017 New York IEEE 11-19 [C]
[[18]]
Huang G, Liu Z, Van der maaten L, et al.. Densely connected convolutional networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, July 21–26, 2017, Honolulu, Hawaii, USA, 2017 New York IEEE 4700-4708 [C]
[[19]]
Liu F, Yang J, Yue H. Moiré pattern removal from texture images via low-rank and sparse matrix decomposition. 2015 Visual Communications and Image Processing (VCIP), December 13–16, 2015, Singapore, 2015 New York IEEE 1-4 [C]
[[20]]
COLLOBERT R, KAVUKCUOGLU K, FARABET C. Torch7: a Matlab-like environment for machine learning[C]//BigLearn NIPS workshop, January, 2011. Cite-Seer, 2011.
[[21]]
KINGMA D P, BA J. Adam: a method for stochastic optimization[EB/OL]. (2014-12-22) [2023-09-28]. https://arxiv.org/abs/1412.6980v6.
[[22]]
Lin T Y, Maire M, Belongie S, et al.. Microsoft coco: common objects in context. 13th European Conference on Computer Vision, September 6–12, 2014, Zurich, Switzerland, 2014 Berlin, Heidelberg Springer 740-755 [C]
[[23]]
Andriluka M, Pishchulin L, Gehler P, et al.. 2D human pose estimation: new benchmark and state of the art analysis. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, June 23–28, 2014, Columbus, Ohio, USA, 2014 New York IEEE 3686-3693 [C]
[[24]]
Huiskes M J, Lew M S. The MIRFLICKR retrieval evaluation. Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval, October 30–31, 2008, Vancouver, Canada, 2008 New York ACM 39-43 [C]
[[25]]
Ronneberger O, Fischer P, Brox T. U-net: convolutional networks for biomedical image segmentation. 18th International Conference on Medical Image Computing and Computer-Assisted Intervention, October 5–9, 2015, Munich, Germany, 2015 Berlin, Heidelberg Springer 234-241 [C]

Accesses

Citations

Detail

Sections
Recommended

/