Seam Carving based visible watermarking robust to removal attacks

Eduardo Fragoso-Navarro, Kevin Rangel-Espinoza, Mariko Nakano-Miyatake, Manuel Cedillo-Hernandez, Hector Perez-Meana

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

Visible watermarking offers direct copyright protection to the naked eye using visible pattern superimposed in the host image. However, due to their exposure, the watermark pattern becomes an easy target to remove by malicious entities that generates copyright-free images. Until now, in the scientific literature several semi-automatic visible watermark removal attacks have been proposed, showing enough visual quality of the recovered host image. In this paper, we propose a watermark design based on modified Seam Carving technique to provide robustness against removal attacks including inpainting-based attacks, Independent Component Analysis (ICA)-based attacks, and image matting-based attacks. Robustness against the attacks is measured using common image quality assessments and a watermark visibility assessment based on the Human Visual System (HVS). Experimental results show robustness of the proposed method against above mentioned watermark removal attacks under the most severe situation, in which adversary has the logotype used as a watermark pattern because it is public in Internet. The proposed method can be applied to any visible watermarking algorithms to make them robust against illegal removal attempts, without sacrificing their original functionality, such as reversibility for authorized users.

Original languageEnglish
Pages (from-to)4499-4513
Number of pages15
JournalJournal of King Saud University - Computer and Information Sciences
Volume34
Issue number7
DOIs
StatePublished - Jul 2022

Keywords

  • Independent Component Analysis
  • Inpainting
  • Removal attacks
  • Seam Carving
  • Visible watermarking
  • Watermark visibility

Fingerprint

Dive into the research topics of 'Seam Carving based visible watermarking robust to removal attacks'. Together they form a unique fingerprint.

Cite this