Computer Science ›› 2024, Vol. 51 ›› Issue (2): 343-351.doi: 10.11896/jsjkx.221200121

• Information Security • Previous Articles     Next Articles

Screen-shooting Resilient DCT Domain Watermarking Method Based on Deep Learning

HUANG Changxi, ZHAO Chengxin, JIANG Xiaoteng, LING Hefei, LIU Hui   

  1. School of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan 430074,China
  • Received:2022-12-20 Revised:2023-05-14 Online:2024-02-15 Published:2024-02-22
  • About author:HUANG Changxi,bornin 1986,Ph.D.His main research interests include information hiding and digital watermar-king.LING Hefei,born in 1976,Ph.D,professor,Ph.D supervisor,is a senior member of CCF(No.05610S).His main research interests include computer vision and so on.
  • Supported by:
    National Natural Science Foundation of China(61972169),National Key Research and Development Program of China(2019QY(Y)0202,2022YFB2601802),Major Scientific and Technological Project of Hubei Province(2022BAA046,2022BAA042),Research Programme on Applied Fundamentals and Frontier Technologies of Wuhan(2020010601012182) and China Postdoctoral Science Foundation (2022M711251).

Abstract: Digital watermarking technology plays an important role in multimedia protection,and the various demands for practical applications promotes the development of digital watermarking technology.Recently,the robustness of the deep learning-based watermarking model has been greatly improved,but the embedding process is mostly carried out in the spatial domain,and this causes obvious distortions to original images.In addition,existing methods do not work well under the screen-shooting attack.To solve the above problems,this paper proposes a deep learning-based DCT domain watermarking method which is robust to the screen-shooting attack.This model consists of a DCT layer,an encoder,a decoder,and a screen shoot simulation layer.The DCT layer converts the Y component of images into the DCT domain,then the encoder embeds secret messages into the image by mo-difying the DCT coefficients through end-to-end training.This embedding method in the frequency domain makes the watermark information to be distributed to the whole space of images so that the distortion effect is reduced.Furthermore,we propose a noise layer to simulate moiré and light reflection effects,which are common distortions in the screen-shooting attack.The training process is splitted into two stages.In the first stage,the encoder and decoder are trained end-to-end.While in the second stage,the screen-shooting simulation layer and traditional distortion attacks are used to augment the watermarked image,then we use the distorted watermarked image to furtheroptimize the decoder.Extensive experimental results show that the proposed model has high transparency and robustness,and is superior to other methods in screen robustness.

Key words: Digital watermark, Deep learning, DCT Transform, Imperceptibility, Screen-shooting robustness

CLC Number: 

  • TP391
[1]LIU S W,DU Q Z,LONG H,et al.Robust Audio WatermarkBased on QR Code[J].Journal of Chinese Computer Systems,2022,43(7):1535-1540.
[2]LI X Y,ZHOU X B,LIU Z.High-capacity and robust image wa-termarking algorithm[J].Journal of Jilin University(Enginee-ring and Technology Edition),2022,52(1):174-179.
[3]FANG H,ZHANG W,ZHOU H,et al.Screen-shooting resilient watermarking[J].IEEE Transactions on Information Forensics and Security,2018,14(6):1403-1418.
[4]ZHU J,KAPLAN R,JOHNSON J,et al.Hidden:Hiding data with deep networks[C]//Proceedings of the European Confe-rence on Computer Vision(ECCV).2018:657-672.
[5]JOHNSON N F,JAJODIA S.Exploring steganography:Seeing the unseen[J].Computer,1998,31(2):26-34.
[6]SHEISI H,MESGARIAN J,RAHMANI M.Stegano-graphy:Dct coefficient replacement method and compare with JSteg algorithm[J].International Journal of Computer and Electrical Engineering,2012,4(4):458-462.
[7]KUNDUR D,HATZINAKOS D.A robust digital image watermarking method using wavelet-based fusion[C]//Proceedings of International Conference on Image Processing.IEEE,1997,1:544-547.
[8]FANG H,CHEN D,HUANG Q,et al.Deep template-based watermarking[J].IEEE Transactions on Circuits and Systems for Video Technology,2020,31(4):1436-1451.
[9]ZHONG X,HUANG P C,MASTORAKIS S,et al.An automated and robust image watermarking scheme based on deep neural networks[J].IEEE Transactions on Multimedia,2020,23:1951-1961.
[10]ZHANG C,BENZ P,KARJAUV A,et al.Udh:Universal deep hiding for steganography,watermarking,and light field messaging[J].Advances in Neural Information Processing Systems,2020,33:10223-10234.
[11]TANCIK M,MILDENHALL B,NG R.Stegastamp:Invisiblehyperlinks in physical photo-graphs[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:2117-2126.
[12]JIA J,GAO Z,CHEN K,et al.RIHOOP:robust invisible hyperlinks in offline and online photo-graphs[J].IEEE Transactions on Cybernetics,2020:7094-7106.
[13]WENGROWSKI E,DANA K.Light field messaging with deep photographic steganography[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2019:1515-1524.
[14]CHENG Y,JI X,WANG L,et al.{mID}:Tracing screen photos via {Moiré} patterns[C]//30th USENIX Security Symposium(USENIX Security 21).2021:2969-2986.
[15]GUGELMANN D,SOMMER D,LENDERS V,et al.Screen watermarking for data theft investigation and attribution[C]//2018 10th International Conference on Cyber Conflict(CyCon).IEEE,2018:391-408.
[16]FANG H,CHEN D,WANG F,et al.TERA:Screen-to-Camera Image Code with Transparency,Efficiency,Robustness and Adaptability[J].IEEE Transactions on Multimedia,2021,24:955-967.
[17]RONNEBERGER O,FISCHER P,BROX T.Convolutional networks for biomedical image segmentation[C]//Medical Image Computing and Computer-Assisted Intervention.2015:234-241.
[18]ZHANG R,ISOLA P,EFROS A A,et al.The unreason-able effectiveness of deep features as aperceptual metric[C]//Procee-dings of the IEEE Conference on Computer Vision and Pattern Recognition.2018:586-595.
[19]HUISKES M J,LEW M S.The mir flickr retrieval evaluation[C]//Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval.2008:39-43.
[20]KINGMA D P,BA J.Adam:A method for stochastic optimization[J].arXiv:1412.6980,2014.
[1] CHEN Runhuan, DAI Hua, ZHENG Guineng, LI Hui , YANG Geng. Urban Electricity Load Forecasting Method Based on Discrepancy Compensation and Short-termSampling Contrastive Loss [J]. Computer Science, 2024, 51(4): 158-164.
[2] LIN Binwei, YU Zhiyong, HUANG Fangwan, GUO Xianwei. Data Completion and Prediction of Street Parking Spaces Based on Transformer [J]. Computer Science, 2024, 51(4): 165-173.
[3] SONG Hao, MAO Kuanmin, ZHU Zhou. Algorithm of Stereo Matching Based on GAANET [J]. Computer Science, 2024, 51(4): 229-235.
[4] XUE Jinqiang, WU Qin. Progressive Multi-stage Image Denoising Algorithm Combining Convolutional Neural Network and
Multi-layer Perceptron
[J]. Computer Science, 2024, 51(4): 243-253.
[5] CHEN Jinyin, LI Xiao, JIN Haibo, CHEN Ruoxi, ZHENG Haibin, LI Hu. CheatKD:Knowledge Distillation Backdoor Attack Method Based on Poisoned Neuronal Assimilation [J]. Computer Science, 2024, 51(3): 351-359.
[6] HUANG Kun, SUN Weiwei. Traffic Speed Forecasting Algorithm Based on Missing Data [J]. Computer Science, 2024, 51(3): 72-80.
[7] ZHENG Cheng, SHI Jingwei, WEI Suhua, CHENG Jiaming. Dual Feature Adaptive Fusion Network Based on Dependency Type Pruning for Aspect-basedSentiment Analysis [J]. Computer Science, 2024, 51(3): 205-213.
[8] HUANG Wenke, TENG Fei, WANG Zidan, FENG Li. Image Segmentation Based on Deep Learning:A Survey [J]. Computer Science, 2024, 51(2): 107-116.
[9] CAI Jiacheng, DONG Fangmin, SUN Shuifa, TANG Yongheng. Unsupervised Learning of Monocular Depth Estimation:A Survey [J]. Computer Science, 2024, 51(2): 117-134.
[10] ZHANG Feng, HUANG Shixin, HUA Qiang, DONG Chunru. Novel Image Classification Model Based on Depth-wise Convolution Neural Network andVisual Transformer [J]. Computer Science, 2024, 51(2): 196-204.
[11] WANG Yangmin, HU Chengyu, YAN Xuesong, ZENG Deze. Study on Deep Reinforcement Learning for Energy-aware Virtual Machine Scheduling [J]. Computer Science, 2024, 51(2): 293-299.
[12] HOU Jing, DENG Xiaomei, HAN Pengwu. Survey on Domain Limited Relation Extraction [J]. Computer Science, 2024, 51(1): 252-265.
[13] YAN Zhihao, ZHOU Zhangbing, LI Xiaocui. Survey on Generative Diffusion Model [J]. Computer Science, 2024, 51(1): 273-283.
[14] GE Huibin, WANG Dexin, ZHENG Tao, ZHANG Ting, XIONG Deyi. Study on Model Migration of Natural Language Processing for Domestic Deep Learning Platform [J]. Computer Science, 2024, 51(1): 50-59.
[15] JING Yeyiran, YU Zeng, SHI Yunxiao, LI Tianrui. Review of Unsupervised Domain Adaptive Person Re-identification Based on Pseudo-labels [J]. Computer Science, 2024, 51(1): 72-83.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!