Advertisement

Digital Color Documents Authentication Using QR Code Based on Digital Watermarking

  • Zinah Mohsin ArkahEmail author
  • Laith Alzubaidi
  • Ammar A. Ali
  • Ahmed Talib Abdulameer
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 940)

Abstract

With the rapid development of the Internet, many problems regarding the processing of electronic documents have emerged, such as content filtering, information retrieval, security and searching. The security problem of electronic documents mainly focuses on copyright protection, content integrity authentication, monitoring, and other. The digital watermarking as an effective technique for copyright protection, content integrity, and originality authentication has been widely paid attention. The digital documents are different from the printed document where the carrier of it is computer disk, hard disk, or CD magnetic materials, so it is easy to tamper, damaged, deleted and copied. Therefore, there is an urgent need for an effective tool which can verify whether the content of the document has tampered or not. This is because the secure authentication of the document is very important. In this paper, the color document authentication based on QR code and digital watermarking has been implemented with a novel technique. Experimental results show that the designed structure has a good invisibility and ideal capacity. Furthermore, the tampered regions can be precisely detected.

Keywords

Authentication QR code Digital watermarking Color documents image/Document security 

References

  1. 1.
    Moulin, P., O’Sullivan, J.A.: Information-theoretic analysis of information hiding. IEEE Trans. Inf. Theory 49(3), 563–593 (2003)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Bagadkar, S.L., Malik, L.G.: Review on extraction techniques for images, textlines and keywords from document image. In: 2014 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–3. IEEE, December 2014Google Scholar
  3. 3.
    Swanson, M.D., Zhu, B., Tewfik, A.H.: Robust data hiding for images. In: 1996 IEEE Digital Signal Processing Workshop Proceedings, Loen, Norway, pp. 37–40. IEEE, September 1996Google Scholar
  4. 4.
    Jian, X., Bin, M.: Document electronic seal system based on digital watermark and DWT technology. In: 2nd IEEE International Conference on Networking and Digital Society (ICNDS), vol. 1, pp. 632–635, May 2010Google Scholar
  5. 5.
    Hassanein, M.S., Ghinea, G.: Text fingerprint key generation. In: IEEE International Conference for Internet Technology and Secured Transactions, pp. 603–609 (2012)Google Scholar
  6. 6.
    Wang, S., Yang, T., Li, J., Yao, B., Zhang, Y.: Does a QR code must be black and white? In: 2015 IEEE International Conference on Orange Technologies (ICOT), pp. 161–164, December 2015Google Scholar
  7. 7.
    Villán-Sebastián, R.F.: Authentication of electronic and printed text documents (Doctoral dissertation, University of Geneva) (2008)Google Scholar
  8. 8.
    Maehara, T., Nakai, K., Ikeda, R., Taniguchi, K., Ono, S.: Watermark design of two-dimensional barcodes on mobile phone display by evolutionary multi-objective optimization. In: 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), pp. 149–154. IEEE, December 2014Google Scholar
  9. 9.
    Yahaya, C.K.H.C.K., Hassan, H., Kahmi, M.I.B.M.: Investigation on perceptual and robustness of LSB digital watermarking scheme on Halal Logo authentication. In: 2012 International Conference on System Engineering and Technology (ICSET), pp. 1–6. IEEE, September 2012Google Scholar
  10. 10.
    Goyal, S., Yadav, S., Mathuria, M.: Exploring concept of QR code and its benefits in digital education system. In: IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1141–1147 (2016)Google Scholar
  11. 11.
    Li, C.M., Hu, P., Lau, W.C.: Authpaper: protecting paper-based documents and credentials using authenticated 2D barcodes. In: 2015 IEEE International Conference on Communications (ICC), pp. 7400–7406. IEEE, June 2015Google Scholar
  12. 12.
    González-Lee, M., Nakano-Miyatake, M., Pérez-Meana, H., Sanchez-Perez, G.: Script format document authentication scheme based on watermarking techniques. J. Appl. Res. Technol. 13(3), 435–442 (2015)CrossRefGoogle Scholar
  13. 13.
    Tanchenko, A.: Visual-PSNR measure of image quality. J. Vis. Commun. Image Represent. 25, 874–878 (2014)CrossRefGoogle Scholar
  14. 14.
    Wegner, D., Repasi, E.: Image based performance analysis of thermal images. In: SPIE Defense + Security. International Society for Optics and Photonics, pp. 98–106 (2016)Google Scholar
  15. 15.
    Su, Q., et al.: An improved color image watermarking algorithm based on QR decomposition. Multimed. Tools Appl. 76(1), 707–729 (2017)CrossRefGoogle Scholar
  16. 16.
    Singh, K.U., Singhal, A.: A color image watermarking scheme based on QR factorization, logistic and lorentz chaotic maps. Int. J. Recent Innov. Trends Comput. Commun. 5(5), 291–296 (2017)Google Scholar
  17. 17.
    Thajeel, S.A., Kadhim, L.M., Abdlateef, S.A.: A new color image watermarking technique using multiple decompositions. J. Theor. Appl. Inf. Technol. 95(10), 2323–2331 (2017)Google Scholar
  18. 18.
    Awad, F.H., et al.: Content based image retrival using combination histogram and moment methods. J. Theor. Appl. Inf. Technol. 96(15), 11 (2018)Google Scholar
  19. 19.
    Li, L., Li, S., Abraham, A., Pan, J.S.: Geometrically invariant image watermarking using polar harmonic transforms. Inf. Sci. 199, 1–19 (2012)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Huang, H.C., Chen, Y.H., Abraham, A.: Optimized watermarking with swarm-based bacterial foraging. J. Inf. Hiding Multimed. Signal Process. 1(1), 51–58 (2010)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Zinah Mohsin Arkah
    • 1
    Email author
  • Laith Alzubaidi
    • 1
  • Ammar A. Ali
    • 2
  • Ahmed Talib Abdulameer
    • 3
  1. 1.University of Information Technology and CommunicationsBaghdadIraq
  2. 2.College of Islamic ScienceUniversity of BaghdadBaghdadIraq
  3. 3.Technical College of ManagementBaghdadIraq

Personalised recommendations