Proceedings Article | 19 April 2008
KEYWORDS: Digital watermarking, Neural networks, Binary data, Image compression, Image processing, Network architectures, Statistical modeling, Image filtering, Evolutionary algorithms, Algorithms
An algorithm of dynamic watermark based on neural network is presented which is more robust against attack of false
authentication and watermark-tampered operations contrasting with one watermark embedded method. (1) Five binary
images used as watermarks are coded into a binary array. The total number of 0s and 1s is 5*N, every 0 or 1 is enlarged
fivefold by information-enlarged technique. N is the original total number of the watermarks' binary bits. (2) Choose the
seed image pixel px,y and its 3×3 vicinities pixel p x-1,y-1,px-1,y,px-1,y+1,px,y-1,px,y+1,px+1,y-1,px+1,y,px+1,y+1 as one sample space.
The px,y is used as the neural network target and the other eight pixel values are used as neural network inputs. (3) To
make the neural network learn the sample space, 5*N pixel values and their closely relevant pixel values are randomly
chosen with a password from a color BMP format image and used to train the neural network.(4) A four-layer neural
network is constructed to describe the nonlinear mapped relationship between inputs and outputs. (5) One bit from the
array is embedded by adjusting the polarity between a chosen pixel value and the output value of the model. (6) One
randomizer generates a number to ascertain the counts of watermarks for retrieving. The randomly ascertained
watermarks can be retrieved by using the restored neural network outputs value, the corresponding image pixels value,
and the restore function without knowing the original image and watermarks (The restored coded-watermarkbit=1, if
ox,y(restored)>px,y(reconstructed, else coded-watermarkbit =0). The retrieved watermarks are different when extracting each time.
The proposed technique can offer more watermarking proofs than one watermark embedded algorithm. Experimental
results show that the proposed technique is very robust against some image processing operations and JPEG lossy
compression. Therefore, the algorithm can be used to protect the copyright of one important image.