skip to main content
10.1145/3474085.3475324acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

MBRS: Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression

Authors Info & Claims
Published:17 October 2021Publication History

ABSTRACT

Based on the powerful feature extraction ability of deep learning architecture, recently, deep-learning based watermarking algorithms have been widely studied. The basic framework of such algorithm is the auto-encoder like end-to-end architecture with an encoder, a noise layer and a decoder. The key to guarantee robustness is the adversarial training with the differential noise layer. However, we found that none of the existing framework can well ensure the robustness against JPEG compression, which is non-differential but is an essential and important image processing operation. To address such limitations, we proposed a novel end-to-end training architecture, which utilizes Mini-Batch of Real and Simulated JPEG compression (MBRS) to enhance the JPEG robustness. Precisely, for different mini-batches, we randomly choose one of real JPEG, simulated JPEG and noise-free layer as the noise layer. Besides, we suggest to utilize the Squeeze-and-Excitation blocks which can learn better feature in embedding and extracting stage, and propose a "message processor" to expand the message in a more appreciate way. Meanwhile, to improve the robustness against crop attack, we propose an additive diffusion block into the network. The extensive experimental results have demonstrated the superior performance of the proposed scheme compared with the state-of-the-art algorithms. Under the JPEG compression with quality factor $Q=50$, our models achieve a bit error rate less than 0.01% for extracted messages, with PSNR larger than 36 for the encoded images, which shows the well-enhanced robustness against JPEG attack. Besides, under many other distortions such as Gaussian filter, crop, cropout and dropout, the proposed framework also obtains strong robustness. The code implemented by PyTorch is avaiable in https://github.com/jzyustc/MBRS.

References

  1. M. Ahmadi, A. Norouzi, Smr Soroushmehr, N. Karimi, and A. Emami. 2018. ReDMark: Framework for Residual Diffusion Watermarking on Deep Networks. CoRR, Vol. abs/1810.07248 (2018). arxiv: 1810.07248Google ScholarGoogle Scholar
  2. Adel Almohammad and Gheorghita Ghinea. 2010. Stego image quality and the reliability of PSNR. In 2nd International Conference on Image Processing Theory Tools and Applications, IPTA.Google ScholarGoogle ScholarCross RefCross Ref
  3. Mart'i n Arjovsky, Soumith Chintala, and Lé on Bottou. 2017. Wasserstein GAN. CoRR, Vol. abs/1701.07875 (2017). arxiv: 1701.07875Google ScholarGoogle Scholar
  4. P. Bassia, I. Pitas, and N. Nikolaidis. 2001. Robust audio watermarking in the time domain. Multimedia IEEE Transactions on, Vol. 3, 2 (2001), 232--241. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chiou-Ting Hsu and Ja-Ling Wu. 1999. Hidden digital watermarks in images. IEEE Transactions on Image Processing, Vol. 8, 1 (1999), 58--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ronan Collobert, Koray Kavukcuoglu, and Clément Farabet. 2011. Torch7: A matlab-like environment for machine learning. In BigLearn, NIPS workshop .Google ScholarGoogle Scholar
  7. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. 1997. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, Vol. 6, 12 (1997), 1673--1687. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. DumitrescuS, WuXiaolin, and WangZhe. 2003. Detection of LSB steganography via sample pair analysis. Signal Processing IEEE Transactions on, Vol. 51, 7 ( 2003), 1995--2007 . Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Fridrich and M. Goljan. 2002. Practical steganalysis of digital images: state of the art. Proceedings of Spie the International Society for Optical Engineering, Vol. 4675 (2002).Google ScholarGoogle Scholar
  10. Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. In ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 27 (NIPS 2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Huiping Guo and Nicolas D. Georganas. 2003. Digital image watermarking for joint ownership verification without a trusted dealer. In Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, ICME. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Hamidi, M. E. Haziti, H. Cherifi, and M. E. Hassouni. 2018. Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform. Multimedia Tools and Applications, Vol. 77, 1 (2018), 1--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. R. Hernandez, M. Amado, and F. Perez-Gonzalez. 2000. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Transactions on Image Processing, Vol. 9, 1 (2000), 55--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Isola, J. Y. Zhu, T. Zhou, and A. A. Efros. 2016. Image-to-Image Translation with Conditional Adversarial Networks. In IEEE Conference on Computer Vision & Pattern Recognition .Google ScholarGoogle Scholar
  15. H. Jie, S. Li, S. Gang, and S. Albanie. 2017. Squeeze-and-Excitation Networks. IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. PP, 99 (2017).Google ScholarGoogle Scholar
  16. G. C. Langelaar, I. Setyawan, and R. L. Lagendijk. 2000. Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Processing Magazine, Vol. 17, 5 (2000), 20--46.Google ScholarGoogle ScholarCross RefCross Ref
  17. Y. Liu, M. Guo, J. Zhang, Y. Zhu, and X. Xie. 2019. A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking. In the 27th ACM International Conference . Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mehdi Mirza and Simon Osindero. 2014. Conditional Generative Adversarial Nets. CoRR, Vol. abs/1411.1784 (2014). arxiv: 1411.1784Google ScholarGoogle Scholar
  19. Alec Radford, Luke Metz, and Soumith Chintala. 2016. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. In 4th International Conference on Learning Representations, ICLR.Google ScholarGoogle Scholar
  20. DE Rumelhart, G. E. Hinton, and R. J. Williams. 1986. Learning Representations by Back Propagating Errors. Nature, Vol. 323, 6088 (1986), 533--536.Google ScholarGoogle ScholarCross RefCross Ref
  21. Richard Shin and Dawn Song. 2017. Jpeg-resistant adversarial images. In NeurIPS Workshop on Machine Learning and Computer Security .Google ScholarGoogle Scholar
  22. Matthew Tancik, Ben Mildenhall, and Ren Ng. 2020. StegaStamp: Invisible Hyperlinks in Physical Photographs. In 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR.Google ScholarGoogle Scholar
  23. R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. 1994. A digital watermark. In Proceedings of 1st International Conference on Image Processing .Google ScholarGoogle Scholar
  24. G. K. Wallace. 1992. The JPEG still picture compression standard. IEEE Transactions on Consumer Electronics, Vol. 38, 1 (1992), xviii--xxxiv. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. W. Zhou, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli. 2004. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process, Vol. 13, 4 (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. B. Zhu, A. H. Tewfik, MD Swanson, and L. Boney. 1998. Robust Audio Watermarking Using Perceptual Masking. Signal Processing, Vol. 66, 3 (1998), 337--355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei. 2018. HiDDeN: Hiding Data with Deep Networks.Google ScholarGoogle Scholar
  28. Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei A. Efros. 2017. Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks. In IEEE International Conference on Computer Vision, ICCV.Google ScholarGoogle Scholar

Index Terms

  1. MBRS: Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MM '21: Proceedings of the 29th ACM International Conference on Multimedia
      October 2021
      5796 pages
      ISBN:9781450386517
      DOI:10.1145/3474085

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 October 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate995of4,171submissions,24%

      Upcoming Conference

      MM '24
      MM '24: The 32nd ACM International Conference on Multimedia
      October 28 - November 1, 2024
      Melbourne , VIC , Australia

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader