Robust Blind Symmetry-based Watermarking in the Frequency Domain Against Social Network Processing and Desynchronization Attacks

Fei Zhang,Hongxia Wang,Mingze He,Jinghong Xia
DOI: https://doi.org/10.1109/tcsvt.2024.3395802
IF: 5.859
2024-01-01
IEEE Transactions on Circuits and Systems for Video Technology
Abstract:The increasing sharing of images on social networking platforms and the abuse of image editing software cause copyright protection and the tracking of digital images to be questionable. Robust image watermarking provides powerful support for overcoming the above issue. Unfortunately, various lossy operations, e.g., compression and resizing, adopted by social network processing, and common desynchronization attacks impose great challenges for implementing robust image watermarking. In this paper, a novel symmetry-based frequency domain image watermarking (SFW) scheme is proposed to resist social network processing and desynchronization attacks. First, we design a watermark preprocessing module that complies with Kerckhoff’s principle, ensuring the security of the watermark algorithm when it is publicly available and avoiding the generation of weak messages. Then, we utilize the basis image features of different frequency domain coefficients and embed the symmetric watermark by modulating specific frequency domain coefficients. This approach addresses the lack of a resynchronization mechanism in state-of-the-art frequency domain watermarking schemes when subjected to desynchronization attacks and also addresses the perceptual degradation problem in symmetric watermarking when the embedding strength increases. Additionally, we enhanced the robustness against desynchronization attacks by constructing symmetrical peaks with consistent numbers of images of different resolutions. Extensive experiments demonstrate that the proposed SFW scheme significantly outperforms existing state-of-the-art watermarking schemes in resisting common social network processing ( Facebook, Instagram, TikTok , and WeChat ) and desynchronization attacks.
What problem does this paper attempt to address?