Abstract

An algorithm of dynamic watermark based on neural network is presented which is more robust against attack of false authentication and watermark-tampered operations contrasting with one watermark embedded method. (1) Five binary images used as watermarks are coded into a binary array. The total number of 0s and 1s is 5*N, every 0 or 1 is enlarged fivefold by information-enlarged technique. N is the original total number of the watermarks' binary bits. (2) Choose the seed image pixel p<sub>x,y</sub> and its 3&times;3 vicinities pixel p <sub>x-1,y-1,</sub>p<sub>x-1,y,</sub>p<sub>x-1,y+1,</sub>p<sub>x,y-1,</sub>p<sub>x,y+1,</sub>p<sub>x+1,y-1,</sub>p<sub>x+1,y,</sub>p<sub>x+1,y+1</sub> as one sample space. The p<sub>x,y</sub> is used as the neural network target and the other eight pixel values are used as neural network inputs. (3) To make the neural network learn the sample space, 5*N pixel values and their closely relevant pixel values are randomly chosen with a password from a color BMP format image and used to train the neural network.(4) A four-layer neural network is constructed to describe the nonlinear mapped relationship between inputs and outputs. (5) One bit from the array is embedded by adjusting the polarity between a chosen pixel value and the output value of the model. (6) One randomizer generates a number to ascertain the counts of watermarks for retrieving. The randomly ascertained watermarks can be retrieved by using the restored neural network outputs value, the corresponding image pixels value, and the restore function without knowing the original image and watermarks (The restored <i>coded-watermark</i><sub>bit</sub>=1, if <i>ox,y(restored)</i>&gt;p<sub>x,y</sub>(<i>reconstructed, else coded-watermark<sub>bit</sub> </i>=0). The retrieved watermarks are different when extracting each time. The proposed technique can offer more watermarking proofs than one watermark embedded algorithm. Experimental results show that the proposed technique is very robust against some image processing operations and JPEG lossy compression. Therefore, the algorithm can be used to protect the copyright of one important image.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call