Journal of Jilin University(Engineering and Technology Edition) ›› 2025, Vol. 55 ›› Issue (12): 4000-4009.doi: 10.13229/j.cnki.jdxbgxb.20240301

Previous Articles    

Anti⁃cropping digital image watermarking based on saliency detection

Rui HUANG1(),Ruo-xue YU1,Wei FAN1(),Yan XING2,Zi-yin CHEN3   

  1. 1.School of Computer and Artificial Intelligence,Civil Aviation University of China,Tianjin 300300,China
    2.School of Safety Science and Engineering,Civil Aviation University of China,Tianjin 300300,China
    3.College of Electronic Information and Automation,Civil Aviation University of China,Tianjin 300300,China
  • Received:2024-03-24 Online:2025-12-01 Published:2026-02-03
  • Contact: Wei FAN E-mail:rhuang@cuac.edu.cn;wfan@cauc.edu.cn

Abstract:

To ensure that the embedded area of the watermark is preserved with a high probability during cropping, we propose an effective and anti-cropping attacked watermarking method. Firstly, we use a saliency detection network to select the embedding region; then we use a Transformer network to embed the transformed watermark into this region; to ensure the robustness of the watermark, a noise layer is used to attack the embedded image before extracting the watermark; finally, we use a fully convolutional network to extract watermark from the salient region. The experimental results show that the proposed method has higher robustness than compared methods under common nine attack methods. Our method can accurately extract the embedded watermark under saliency detection-based cropping attack.

Key words: computer application, image watermarking, saliency detection, cropping

CLC Number: 

  • TP309

Fig.1

Framework of anti-cropping digital image watermarking based on saliency detection(represents the operation of dot product,represents the operation of add, ?represents the operation of pasting)"

Fig.2

Example of watermarking redundant operation based on permutation and recombination"

Fig.3

Structure of watermark embedding network"

Fig.4

Structure of watermark extraction network"

Table 1

PNSR and SSIM of the watermarked image and the BER and SSIM of the extracted watermark without attack"

方法嵌入水印的图像提取的水印图像
PSNRSSIMBERSSIM
DIWm32.130.960.124 70.817 6
ReDMark25.030.770.125 40.696 2
DAH-Net30.170.940.014 30.999 1
本文31.500.920.002 00.992 4

Fig.5

Extracted watermark under cropping attack based on saliency detection"

Table 2

BER and SSIM of the attacked watermarked images obtained by different attack methods and inference time of different methods"

攻击方法参数DIWmReDMarkDAH-Net本文方法
BERSSIMBERSSIMBERSSIMBERSSIM
椒盐噪声0.40.367 70.314 40.135 80.690 20.226 10.378 80.004 50.973 7
0.30.347 90.316 90.130 30.695 00.225 80.380 90.004 50.974 3
0.20.314 00.325 60.127 40.697 10.224 80.385 40.004 50.975 3
剪切0.60.194 40.596 60.163 60.682 70.085 00.856 60.003 70.982 4
0.50.193 00.604 00.169 20.681 00.120 50.779 80.003 90.981 9
0.40.191 60.612 70.173 30.679 90.152 50.706 70.003 90.980 8
裁剪替换0.30.169 30.583 40.176 80.679 00.204 80.518 50.097 10.769 1
0.20.176 20.524 30.179 10.678 50.227 70.457 50.125 90.736 4
0.10.183 70.451 80.180 10.678 40.240 20.425 40.165 60.694 2
像素替换0.40.139 90.804 70.138 00.690 40.102 20.725 60.021 90.949 2
0.30.146 00.783 50.151 50.683 20.141 20.626 60.037 70.918 5
0.20.142 00.748 40.171 30.679 70.183 50.533 50.065 00.868 8
高斯滤波30.219 10.292 70.180 10.678 40.129 90.634 20.001 70.991 0
20.201 00.304 90.180 10.678 40.084 30.744 30.009 80.963 9
10.175 00.385 00.180 10.678 40.021 80.985 40.002 90.989 1
中值滤波70.184 50.347 10.180 10.678 40.184 30.532 90.040 40.910 2
50.167 30.391 30.180 10.678 40.113 60.669 40.025 40.926 2
30.144 90.501 90.180 10.678 40.032 20.943 70.003 30.987 7
高斯噪声0.20.348 60.318 90.180 10.678 40.224 50.380 90.004 50.975 3
0.10.307 70.330 30.180 10.678 40.223 70.383 40.004 30.977 3
0.050.255 00.357 80.180 10.678 40.222 30.386 80.003 70.980 3
JPEG压缩500.099 50.857 30.134 90.687 80.224 30.446 30.173 10.687 3
700.101 20.868 60.129 20.692 20.226 40.443 40.175 90.683 7
900.091 00.932 80.126 40.697 70.230 00.438 90.085 70.835 6
缩放1.20.132 80.602 10.170 80.677 90.027 50.948 90.002 50.990 3
1.10.126 10.674 40.174 00.678 80.032 80.895 80.002 30.990 5
0.90.135 30.593 70.179 30.678 50.033 70.891 20.002 30.990 9
时间/(张·s-10.290.060.350.15

Fig.6

Noised image and extracted watermark compared with different methods under different attacks"

Table 3

Comparison of the quality of watermark extracted by different methods under cropping attack based on saliency detection"

方法显著性裁剪攻击BERSSIM
DIWm0.205 70.571 4
0.124 70.817 6
ReDMark0.170 40.681 5
0.125 40.696 2
DAH-Net0.242 90.419 6
0.014 30.999 1
本文0.002 00.992 4
0.000 30.998 2

Table 4

Ablation experiments of saliency networks"

实 验嵌入水印的图像提取的水印图像
PSNRSSIMBERSSIM
未使用显著性网络32.210 80.916 70.006 00.975 9
使用显著性网络31.495 00.920 80.002 00.992 4

Fig.7

Ablation experiments of saliency network"

Table 5

Ablation experiments of watermark redundant modules"

实 验嵌入水印的图像提取的水印图像
PSNRSSIMBERSSIM
未使用水印冗余模块31.670 30.918 40.032 00.912 9
使用水印冗余模块31.495 00.920 80.002 00.992 4

Fig.8

Ablation experiments of watermark redundant modules"

[1] Van Schyndel R G, Tirkel A Z, Osborne C F. A digital watermark[C]∥Proceedings of 1st International Conference on Image Processing,Austin, USA, 1994: 86-90.
[2] Ko H J, Huang C T, Horng G, et al. Robust and blind image watermarking in DCT domain using inter-block coefficient correlation[J]. Information Sciences, 2020, 517: 128-147.
[3] Cedillo-Hernandez M, Cedillo-Hernandez A, Garcia-Ugalde F J. Improving dft-based image watermarking using particle swarm optimization algorithm[J]. Mathematics, 2021, 9(15): No. 1795.
[4] Giri K J, Quadri S M K, Bashir R, et al. DWT based color image watermarking: a review[J]. Multimedia Tools and Applications, 2020, 79: 32881-32895.
[5] Assini I, Badri A, Safi K, et al. A robust hybrid watermarking technique for securing medical image[J]. International Journal of Intelligent Engineering and Systems, 2018, 11(3): 169-176.
[6] 李喜艳, 周夏冰, 刘征. 基于高容量强鲁棒的图像水印算法[J]. 吉林大学学报: 工学版, 2022, 52(1): 174-179.
Li Xi-yan, Zhou Xia-bing, Liu Zheng. High-capacity and robust image watermarking algorithm[J]. Journal of Jilin University (Engineering and Technology Edition), 2022, 52(1): 174-179.
[7] Hsu C S, Tu S F. Enhancing the robustness of image watermarking against cropping attacks with dual watermarks[J]. Multimedia Tools and Applications, 2020, 79(17/18): 11297-11323.
[8] Liu J, Huang J, Luo Y, et al. An optimized image watermarking method based on HD and SVD in DWT domain[J]. IEEE Access, 2019, 7: 80849-80860.
[9] Zhu J, Kaplan R, Johnson J, et al. Hidden: hiding data with deep networks[C]∥Proceedings of the European Conference on Computer Vision (ECCV),Munich, Germany, 2018: 657-672.
[10] Lu J, Ni J, Su W, et al. Wavelet-based CNN for robust and high-capacity image watermarking[C]∥IEEE International Conference on Multimedia and Expo (ICME), Taipei, China, 2022: 1-6.
[11] Liu Y, Guo M, Zhang J, et al. A novel two-stage separable deep learning framework for practical blind watermarking[C]∥Proceedings of the 27th ACM International Conference on Multimedia,Nice, France,2019: 1509-1517.
[12] Zhang L, Lu Y, Li J, et al. Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction[J]. Neural Computing and Applications, 2023, 35(15): 10909-10927.
[13] Marchesotti L, Cifarelli C, Csurka G. A framework for visual saliency detection with applications to image thumbnailing[C]∥IEEE 12th International Conference on Computer Vision, Kyoto, Japan, 2009: 2232-2239.
[14] 刘洋, 毛克明. 基于自适应反馈机制的小差异化图像纹理特征信息数据检索[J]. 江苏大学学报: 自然科学版, 2025, 46(1): 73-81.
Liu yang, mao Ke-ming. Retrieval of texture feature information data for small differentiated images based on adaptive feedback mechanism[J]. Journal of Jiangsu University(Natural Science Edition), 2025, 46(1): 73-81.
[15] Tu Y, Niu L, Zhao W, et al. Image cropping with composition and saliency aware aesthetic score map[C]∥Proceedings of the AAAI Conference on Artificial Intelligence, New York, USA,2020: 12104-12111.
[16] Thahab A T, Shahadi H I. Robust image watermarking against crop and rotation attacks for public communication networks[C]∥Third Scientific Conference of Electrical Engineering,Baghdad, Iraq, 2018: 105-110.
[17] Jia Z, Fang H, Zhang W. Mbrs: enhancing robustness of dnn-based watermarking by mini-batch of real and simulated jpeg compression[C]∥Proceedings of the 29th ACM International Conference on Multimedia, Chengdu, China, 2021: 41-49.
[18] Ding J, Cao Y, Shi C. CropDefender: deep watermark which is more convenient to train and more robust against cropping[J/OL].[2024-03-05].
[19] Tancik M, Mildenhall B, Ng R. Stegastamp: invisible hyperlinks in physical photographs[C]∥Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, USA,2020: 2117-2126.
[20] Ahmadi M, Norouzi A, Karimi N, et al. ReDMark: framework for residual diffusion watermarking based on deep networks[J]. Expert Systems with Applications, 2020, 146: No.113157.
[21] Liu J J, Hou Q, Cheng M M, et al. A simple pooling-based design for real-time salient object detection[C]∥Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition,Long Beach, USA, 2019: 3912-3921.
[22] Deng J, Dong W, Socher R, et al. ImageNet: a large-scale hierarchical image database[C]∥IEEE Conference on Computer Vision and Pattern Recognition, Miami, USA, 2009: 248-255.
[1] Qing-lin AI,Yuan-xiao LIU,Jia-hao YANG. Small target swmantic segmentation method based MFF-STDC network in complex outdoor environments [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(8): 2681-2692.
[2] Yu-fei ZHANG,Li-min WANG,Jian-ping ZHAO,Zhi-yao JIA,Ming-yang LI. Robot inverse kinematics solution based on center selection battle royale optimization algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(8): 2703-2710.
[3] Yan PIAO,Ji-yuan KANG. RAUGAN:infrared image colorization method based on cycle generative adversarial networks [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(8): 2722-2731.
[4] Qiong-xin LIU,Tian-tian WANG,Ya-nan WANG. Non-dominated sorted particle swarm genetic algorithm to solve vehicle location routing problems [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(7): 2464-2474.
[5] Xiang-jiu CHE,Liang LI. Graph similarity measurement algorithm combining global and local fine-grained features [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(7): 2365-2371.
[6] Wen-hui LI,Chen YANG. Few-shot remote sensing image classification based on contrastive learning text perception [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(7): 2393-2401.
[7] Shan-na ZHUANG,Jun-shuai WANG,Jing BAI,Jing-jin DU,Zheng-you WANG. Video-based person re-identification based on three-dimensional convolution and self-attention mechanism [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(7): 2409-2417.
[8] Hai-peng CHEN,Shi-bo ZHANG,Ying-da LYU. Multi⁃scale context⁃aware and boundary⁃guided image manipulation detection method [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(6): 2114-2121.
[9] Jian WANG,Chen-wei JIA. Trajectory prediction model for intelligent connected vehicle [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(6): 1963-1972.
[10] Feng-feng ZHOU,Zhe GUO,Yu-si FAN. Feature representation algorithm for imbalanced classification of multi⁃omics cancer data [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(6): 2089-2096.
[11] Xiang-jiu CHE,Yu-peng SUN. Graph node classification algorithm based on similarity random walk aggregation [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(6): 2069-2075.
[12] Ping-ping LIU,Wen-li SHANG,Xiao-yu XIE,Xiao-kang YANG. Unbalanced image classification algorithm based on fine⁃grained analysis [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(6): 2122-2130.
[13] You-wei WANG,Ao LIU,Li-zhou FENG. New method for text sentiment classification based on knowledge distillation and comment time [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(5): 1664-1674.
[14] Hong-wei ZHAO,Ming-zhu ZHOU,Ping-ping LIU,Qiu-zhan ZHOU. Medical image segmentation based on confident learning and collaborative training [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(5): 1675-1681.
[15] Zi-hao SHEN,Yong-sheng GAO,Hui WANG,Pei-qian LIU,Kun LIU. Deep deterministic policy gradient caching method for privacy protection in Internet of Vehicles [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(5): 1638-1647.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!