key: cord-0047214-9j85jjtc authors: Gourrame, Khadija; Douzi, Hassan; Harba, Rachid; Rabia, Riad; Ros, Frederic; ElHajji, Mehamed title: Image Watermarking Based on Fourier-Mellin Transform date: 2020-06-05 journal: Image and Signal Processing DOI: 10.1007/978-3-030-51935-3_37 sha: 224e8d7e0d940f327cbfd9fa16ca753625b9e48f doc_id: 47214 cord_uid: 9j85jjtc Geometric attacks are still challenging issues in image watermarking. In this paper, the robustness of different insertion position and shape of the watermark are evaluated in watermarking scheme based on Fourier-Mellin transform. We propose diagonal, rectangular, and circular insertion of the mark. The robustness of these techniques against geometric deformations such as rotation, scaling and translation (RST) is evaluated. Results show that the circular insertion performs better for translation and scaling attacks, while the diagonal insertion is better for rotations and RST attacks. The last point makes the diagonal insertion to be preferred in industrial applications since the combination of RST attacks often occurs in many applications such as printing the image on a physical support, and scanning it (print-scan attack). Robustness of image watermarking techniques is an active research area for many years. Yet, there is no existing watermarking method that achieves a complete robustness to all common watermarking attacks including geometric distortions. In general, image watermarking techniques are implemented in spatial domain or transformed domains [1] . The most used transforms are discrete cosine transform (DCT), discrete wavelet transform (DWT), and discrete Fourier transform (DFT). Although DCT and DWT are very robust to common signal processing attacks such as compression and signal filtering, they are weak to resist geometric distortions [2] . However, DFT has the advantage of being more resistant to geometric attacks [3, 4] . Geometric distortions are one of the major issues in industrial watermarking applications where the so-called print-scan occurs (print-scan means that the image is printed on a physical support, and then scanned). RST (rotation, scaling and translation) deformations are typically produced by print-scan process. Geometric attacks cause a loss of synchronization between the extracted watermark and the embedded one. Thus, many schemes are proposed in the literature to solve the synchronization issue. In our team, Riad et al. have developed a robust watermarking method in the Fourier domain for print-scan process using a Fourier method for identity (ID) images [4] . The object was to increase the security of official documents as for example ID cards or passports. In that case, the print-scan attack produces rotations and translations of small amplitudes. To be rotation invariant, the watermark vector is embedded in the magnitude of the Fourier transform of the original image, as a circle of radius r around the center of the transformed image in the medium frequency domain, translation problems are being naturally handled by Fourier capabilities. Regarding scaling deformations, in [3, 4] , they proposed to resize the image to its original size before the watermark detection. However, this Fourier method is not robust to scale deformations in case if the size of original image is unknown. To overcome the scaling problem, Fourier log-polar approach or Fourier-Mellin transform [5, 6] is proposed as an RST invariant method. Converting the cartesian coordinates of Fourier magnitude into logpolar coordinates, transforms the rotation and scaling operations into translation ones, so that the whole process becomes invariant to RST. Many watermarking techniques are proposed in literature using FMT. Many research works try to reduce the steps in Fourier-Mellin transform as in [6] . Log-polar transform (LPT) is used as a partial step of FMT technique for proposing robust image watermarking [7] , however this proposition is designed for non-blind watermarking method. Fourier-Mellin moments are used as image features for watermark registration and extraction for copyright authentication [8] . Quaternion Discrete Fourier transform (QDFT) combined with LPM represents new version of FMT in recent years [9] , this method is robust against signal processing attacks for small image blocks with QDFT. However, for geometric attacks, the robustness was secured with the help of a template, which limits and reduces the range of RST attacks. After the O. Ruanaidh and T. Pun [5] work, the followed proposed method in literature try to avoid to go through all the steps to get an RST invariant domain, which it compromise on the robustness of the method in the first place. Early studies show that considering shape, position and other parameters related to the watermark are improving on the robustness of the method [4, 10] . In this paper, different insertion watermarking schemes based on Fourier-Mellin transform (FMT) are studied. These techniques are tested against geometric deformation such as translation, rotation and scaling (RST). The methods associate watermark insertion in different geometrical shapes and positions in invariant RST domains based on Fourier-Mellin transform. The presented techniques are circular insertion [4] , diagonal insertion [10] and rectangular insertion. The robustness of the presented methods are compared and discussed. The paper is organized as follows. Section 2 presents the theoretical background. Section 4 describes the watermarking method based on FMT and it shows results of the robustness test of the three tested methods under RTS attacks, Sect. 4 gives a conclusion. In this section, geometric properties of the Fourier transform are presented. The properties of the Fourier-Mellin transform are also explained which show that it is naturally resistant to RST. The Fourier transform Fðu; vÞ of an image f ðx; yÞ is: Ft is invariant to translations in term of magnitude part: where a and b are translation parameters. Rotation of an image with angle h in spatial domain is converted into a rotation with the same angle in Fourier domain: Scaling in spatial domain with a factor a is converted into a scaling with the inverse factor in Fourier domain: Properties in (2) and (3) demonstrate that the magnitude of the Fourier transform naturally resists to rotations and translations, but not to scaling changes. It is therefore naturally adapted to RT attacks. Fourier-Mellin transform of image f ðr; hÞ(in polar coordinates) is: With a set of integration by substitution, FMT can be expressed as FT of an image in log polar coordinates [5] : The geometric properties of the Fourier-Mellin transform are related to the geometric properties of both the log-polar transform and the Fourier transform: Log-polar transform converts rotation and scaling into translation as expressed in the following equations: where ðx 0 ; y 0 Þ are cartesian coordinates after rotation with u. r; h ð Þ and q; h ð Þ are the polar and log-polar coordinates respectively. Fourier transform is invariant to translation therefore Fourier transform of an image in log-polar coordinates is invariant to rotation and scaling. As a result, Fourier-Mellin transform is invariant to rotation and scaling. Fourier-Mellin domain for watermarking is described first by O. Ruanaidh and T. Pun [5] . Figure 1 . illustrates the process of obtaining the rotation, scaling and translation (RST) transformation invariant from a digital image. This is explained in the following. Imagine that the input image at the bottom of Fig. 1 is subject to a RST attack. As seen in Fig. 1 , a series of 3 transforms is going to be applied to this image. For the first FT, the magnitude of the FT of the image is invariant to translation, while a rotation and a scale changes are still present. When the LPT is applied (the first part of the FM transform), the remaining rotation and scale are transformed into translations. All these properties were recalled in Sect. 2 of this document. For the last FT (the second part of the FMT), the magnitude of the FT is now invariant to translations (known from the first FT), but it is also invariant to rotation and scale. It results in a RST invariant domain. The watermark takes the form of two dimensional spread spectrum signal in the RST transformation invariant domain. First, Fourier transform (FFT) is applied and then followed by a Fourier-Mellin transform (FMT-A log-polar mapping (LPM) followed by a Fourier transform). The invariant coefficients selected for their robustness to image processing are marked using a spread spectrum signal. The inverse mapping is computed as an inverse Fourier transform (IFFT) followed by an inverse Fourier-Mellin transform (IFMT-An inverse log-polar mapping (ILPM) followed by an inverse FFT). The embedding process of the three methods consists on: First, luminance values of the cover work are transformed to the RST domain Fig. 1 . Then the watermark W as a pseudo-random sequence of N binary elements is inserted in the mid frequencies magnitude coefficients along a circle of radius r, which can be expressed with this equation: where M W is the mid frequencies in RST domain Fig. 1 , M f is the original frequencies before the watermark insertion, and a is the strength parameter. The choice of a is related to the invisibility of the watermark. The watermark is spread over all the image pixels taking into account the peak signal-to-noise ratio (PSNR) metric. Hence, an adaptive strength a is determined to obtain the desired value of PSNR, in general equal to 40 dB [3, 11] . Finally, the watermarked image is obtained by applying the inverse process of FMT Fig. 1 . The blind detection needs only the tested image and the watermark W. First, the FMT is applied to the luminance of the image. Then, the coefficients are extracted from the RST domain. the normalized correlation is computed between the extracted coefficients and the sequence W of the watermark [2] . See Fig. 2 and Table 1 . See Fig. 3 and Table 2 . See Fig. 4 and Table 3 . Comparison results are presented in Fig Under translation attack, the three tested methods give better result with the higher performance of the circular insertion method. Diagonal insertion shows better performance against rotation attack compared with circular and diagonal insertion method. However, circular insertion shows higher performance against scaling attack. Under a combination of the attacks RST the performance of the three methods is similar with a slight outperform of diagonal insertion. In this paper, the robustness of different insertion position and shape of the watermark were evaluated in a watermarking scheme based on the Fourier-Mellin transform (FMT). The diagonal, rectangular and circular insertions were tested against geometric deformation such as rotation, scaling and translation (RST). Results show that the circular insertion performs better for translations and scaling attacks, while the diagonal insertion is better for rotations and RST attacks. This last point makes that the diagonal insertion should be preferred in industrial applications when printing the image on a physical support, and scanning it (print-scan process or print-scan attack). Future works concerned the protection of official documents containing an Identity image (passport or ID cards) using watermarking methods. In that case, it is expected in the future that the detection of the mark in the ID document will be assessed using a smartphone (print-cam process). The geometric attack is stronger than the RST attack. It is a perspective attack, a RST attack combined to a tilling of the optical axis of the camera that takes the image. In a first step, we will test the robustness of the FMT watermark insertion with various insertion position and shape to the perspective attack. In a second step, we will develop an android version of the method. Digital Watermarking, IWDW 2005 Digital Watermarking and Steganography Discrete Fourier transform-based watermarking method with an optimal implementation radius Robust Fourier watermarking for id images on smart card plastic supports Rotation, scale and translation invariant spread spectrum digital image watermarking Rotation, scale, and translation resilient watermarking for images RST-invariant digital image watermarking based on logpolar mapping and phase correlation Robust watermarking using orthogonal Fourier-Mellin moments and chaotic map for double images Color image watermarking based on quaternion Fourier transform and improved uniform log-polar mapping Robust digital image watermarking method against geometrical attacks Digital image steganography: survey and analysis of current methods