skip to main content
10.1145/3474085.3475628acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article
Open Access

Towards Robust Deep Hiding Under Non-Differentiable Distortions for Practical Blind Watermarking

Published:17 October 2021Publication History

ABSTRACT

Data hiding is one widely used approach for proving ownership through blind watermarking. Deep learning has been widely used in data hiding, for which inserting an attack simulation layer (ASL) after the watermarked image has been widely recognized as the most effective approach for improving the pipeline robustness against distortions. Despite its wide usage, the gain of enhanced robustness from ASL is usually interpreted through the lens of augmentation, while our work explores this gain from a new perspective by disentangling the forward and backward propagation of such ASL. We find that the main influential component is forward propagation instead of backward propagation. This observation motivates us to use forward ASL to make the pipeline compatible with non-differentiable and/or black-box distortion, such as lossy (JPEG) compression and photoshop effects. Extensive experiments demonstrate the efficacy of our simple approach.

References

  1. Mahdi Ahmadi, Alireza Norouzi, Nader Karimi, Shadrokh Samavi, and Ali Emami. 2020. ReDMark: Framework for residual diffusion watermarking based on deep networks. Expert Systems with Applications (2020).Google ScholarGoogle Scholar
  2. Farhan A Alenizi. 2017. Robust Data Hiding in Multimedia for Authentication and Ownership Protection. Ph.D. Dissertation.Google ScholarGoogle Scholar
  3. Shumeet Baluja. 2017. Hiding images in plain sight: Deep steganography. In NeurIPS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Z Bao, X Luo, Y Zhang, C Yang, and F Liu. 2018. A robust image steganography on resisting JPEG compression with no side information. IETE Technical Review (2018).Google ScholarGoogle Scholar
  5. Preeti Bhinder, Kulbir Singh, and Neeru Jindal. 2018. Image-adaptive watermarking using maximum likelihood decoder for medical images. Multimedia Tools and Applications (2018). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Beijing Chen, Chunfei Zhou, Byeungwoo Jeon, Yuhui Zheng, and Jinwei Wang. 2018. Quaternion discrete fractional random transform for color image adaptive watermarking. Multimedia Tools and Applications (2018). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009. ImageNet: A large-scale hierarchical image database. In CVPR.Google ScholarGoogle Scholar
  8. Hongchang Gao, Jian Pei, and Heng Huang. 2019. Demystifying dropout. In ICML.Google ScholarGoogle Scholar
  9. Giaime Ginesu, Maurizio Pintus, and Daniele D Giusto. 2012. Objective assessment of the WebP image coding algorithm. Signal Processing: Image Communication (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. NJ Harish, BBS Kumar, and Ashok Kusagur. 2013. Hybrid robust watermarking techniques based on DWT, DCT, and SVD. International Journal of Advanced Electrical and electronics engineering (2013).Google ScholarGoogle Scholar
  11. Jamie Hayes and George Danezis. 2017. Generating steganographic images via adversarial training. In NeurIPS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Quan Huynh-Thu and Mohammed Ghanbari. 2008. Scope of validity of PSNR in image/video quality assessment. Electronics letters (2008).Google ScholarGoogle Scholar
  13. Bibi Isac and V Santhi. 2011. A study on digital image and video watermarking schemes using neural networks. International Journal of Computer Applications (2011).Google ScholarGoogle ScholarCross RefCross Ref
  14. Cong Jin and Shihui Wang. 2007. Applications of a neural network to estimate watermark embedding strength. In International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Haribabu Kandi, Deepak Mishra, and Subrahmanyam RK Sai Gorthi. 2017. Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Computers & Security (2017). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Xiangui Kang, Jiwu Huang, and Wenjun Zeng. 2010. Efficient general print-scanning resilient data hiding based on uniform log-polar mapping. TIFS (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Diederik P Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In ICLR.Google ScholarGoogle Scholar
  18. Didier Le Gall. 1991. MPEG: A video compression standard for multimedia applications. Commun. ACM (1991). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, and C Lawrence Zitnick. 2014. Microsoft COCO: Common objects in context. In ECCV.Google ScholarGoogle Scholar
  20. Yang Liu, Mengxi Guo, Jian Zhang, Yuesheng Zhu, and Xiaodong Xie. 2019. A novel two-stage separable deep learning framework for practical blind watermarking. In ACM MM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Wei Lu, Wei Sun, and Hongtao Lu. 2009. Robust watermarking based on DWT and nonnegative matrix factorization. Computers & Electrical Engineering (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Aayush Mishra, Suraj Kumar, Aditya Nigam, and Saiful Islam. 2019. VStegNET: Video Steganography Network using Spatio-Temporal features and Micro-Bottleneck. BMVC (2019).Google ScholarGoogle Scholar
  23. Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Omar Fawzi, and Pascal Frossard. 2017. Universal adversarial perturbations. In CVPR.Google ScholarGoogle Scholar
  24. Seung-Min Mun, Seung-Hun Nam, Han-Ul Jang, Dongkyu Kim, and Heung-Kyu Lee. 2017. A robust blind watermarking using convolutional neural network. arXiv preprint arXiv:1704.03248 (2017).Google ScholarGoogle Scholar
  25. William B Pennebaker and Joan L Mitchell. 1992. JPEG: Still image data compression standard. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Khalid Sayood. 2017. Introduction to data compression. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Richard Shin and Dawn Song. 2017. Jpeg-resistant adversarial images. In NIPS 2017 Workshop on Machine Learning and Computer Security.Google ScholarGoogle Scholar
  28. Satendra Pal Singh and Gaurav Bhatnagar. 2018. A new robust watermarking system in integer DCT domain. Journal of Visual Communication and Image Representation (2018).Google ScholarGoogle Scholar
  29. Surya Pratap Singh, Paresh Rawat, and Sudhir Agrawal. 2012. A robust watermarking approach using DCT-DWT. International journal of emerging technology and advanced engineering (2012).Google ScholarGoogle Scholar
  30. Athanassios Skodras, Charilaos Christopoulos, and Touradj Ebrahimi. 2001. The jpeg 2000 still image compression standard. IEEE Signal processing magazine (2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Xinyu Weng, Yongzhi Li, Lu Chi, and Yadong Mu. 2018. Convolutional video steganography with temporal residual modeling. arXiv preprint arXiv:1806.02941 (2018). Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Pin Wu, Yang Yang, and Xiaoqiang Li. 2018. Image-into-Image Steganography Using Deep Convolutional Network. In Pacific Rim Conference on Multimedia.Google ScholarGoogle Scholar
  33. Chaoning Zhang, Philipp Benz, Tooba Imtiaz, and In-So Kweon. 2020 a. Understanding Adversarial Examples from the Mutual Influence of Images and Perturbations. In CVPR.Google ScholarGoogle Scholar
  34. Chaoning Zhang, Philipp Benz, Adil Karjauv, and In So Kweon. 2021 a. Universal Adversarial Perturbations Through the Lens of Deep Steganography: Towards A Fourier Perspective. AAAI (2021).Google ScholarGoogle Scholar
  35. Chaoning Zhang, Philipp Benz, Adil Karjauv, Geng Sun, and In Kweon. 2020 b. UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging. NeurIPS (2020).Google ScholarGoogle Scholar
  36. Chaoning Zhang, Chenguo Lin, Philipp Benz, Kejiang Chen, Weiming Zhang, and In So Kweon. 2021 b. A Brief Survey on Deep Learning Based Data Hiding, Steganography and Watermarking. arXiv preprint arXiv:2103.01607 (2021).Google ScholarGoogle Scholar
  37. Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei. 2018. Hidden: Hiding data with deep networks. In ECCV.Google ScholarGoogle Scholar

Index Terms

  1. Towards Robust Deep Hiding Under Non-Differentiable Distortions for Practical Blind Watermarking

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MM '21: Proceedings of the 29th ACM International Conference on Multimedia
      October 2021
      5796 pages
      ISBN:9781450386517
      DOI:10.1145/3474085

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 October 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate995of4,171submissions,24%

      Upcoming Conference

      MM '24
      MM '24: The 32nd ACM International Conference on Multimedia
      October 28 - November 1, 2024
      Melbourne , VIC , Australia

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader