Abstract
should not affect the quality of data. Robustness refers to the requirement that embedded watermarks should be de-tected reliably even after some attacks. In the digital watermarking world, geometric attacks are regarded as very strong and harmful attacks. In most wa-termarking schemes, including the spread spectrum watermarking,3,4 the synchronization of an embedded wa-termark with the reference watermark is crucial for the wa-termark detection. Geometric attacks prevent watermark detection by desynchronizing the embedded watermark. Even slight rotation or scaling of the marked image can cause watermark detection failure if the watermark detector does not have a synchronization mechanism. One watermarking method that handles geometric at-tacks is to embed a watermark into a geometric-invariant domain. The Fourier-Mellin-transform-based method5,6 be-longs to this approach. This method seems to provide a nice Autocorrelation function ~ACF!-based watermarking is yet another approach.12–14 In this scheme, a periodic water-mark pattern is embedded into an image. The periodic wa-termark makes periodic peaks in the ACF of the watermark. The geometric transforms that have been applied to the marked image are estimated by inspecting the pattern of the extracted peak. This scheme also has the two detection fail-ure modes. For reliable watermark detection, both the au-tocorrelation AC peaks and the embedded watermark should survive attacks. Watermarking systems are often required to resist com-bined geometric and removal attacks. The removal attacks refer to some processing that can remove or attenuate an embedded watermark signal. The printing-scanning pro-cess, which is one of the most popular geometric attacks, is also a kind of combined attack. During the printing-scanning process, slight rotation or scaling of the image isImproved autocorre watermarking wit
Keyphrases
slight rotation removal attack geometric attack watermark detection autocorre watermarking wit watermark detector harmful attack au-tocorrelation ac peak periodic peak synchronization mechanism marked image combined attack embedded wa-termark digital watermarking world periodic water-mark pattern printing-scanning process printing-scanning pro-cess extracted peak com-bined geometric geometric at-tacks geometric transforms robustness refers wa-termark detection geometric-invariant domain watermark detection failure nice autocorrelation function acf spread spectrum watermarking embedded watermark signal fourier-mellin-transform-based method5 reference watermark popular geometric attack detection fail-ure mode embedded watermark wa-termarking scheme reliable watermark detection