Abstract
Two-dimensional barcodes (2D codes) have become common as an authentification way of e-tickets and e-coupons. However, easy replication by using other mobile phone camera is apprehended. This paper proposes a method for detecting copied 2D code by a semi-fragile digital video watermark which can be destroyed by replication. Compared to digital image watermarking, it is more difficult to copy 2D code in which the time-varying watermark is embedded without destroying the watermark. In the proposed method, the video watermarking scheme is optimized to maximize the difference of the watermark extraction degree between valid and replicated 2D code videos. The optimization is performed using a novel self-adaptive differential evolution algorithm with actual mobile devices rather than simulation. Experimental results have shown that the proposed method successfully designs a video watermarking scheme which allows authenticity determination of 2D codes displayed on mobile device screen.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Values of m and n were determined by referring to JPEG compression.
References
Anqiang, L., Jing, L.: A novel scheme for robust video watermark in the 3D-DWT domain. In: 2007 The First International Symposium on Data, Privacy, and E-Commerce, ISDPE 2007, pp. 514–516. IEEE (2007)
Chen, A.H.L., Chyu, C.C.: A memetic algorithm for maximizing net present value in resource-constrained project scheduling problem. In: Proceedings of IEEE World Congress on Computational Intelligence, pp. 2401–2408 (2008)
Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)
Chu, S.C., Huang, H.C., Shi, Y., Wu, S.Y., Shieh, C.S.: Genetic watermarking for zerotree-based applications. Circ. Syst. Sig. Process. 27(2), 171–182 (2008). http://dx.org/10.1007/s00034-008-9025-z
Das, S., Suganthan, P.N.: Differential evolution: a survey of the state-of-the-art. IEEE Trans. Evol. Comput. 15(1), 4–31 (2011)
Huang, H.C., Chu, S.C., Pan, J.S., Huang, C.Y., Liao, B.Y.: Tabu search based multi-watermarks embedding algorithm with multiple description coding. Inf. Sci. 181(16), 3379–3396 (2011). http://www.sciencedirect.com/science/article/pii/S0020025511001757
Huang, H.Y., Yang, C.H., Hsu, W.H.: A video watermarking algorithm based on pseudo 3D DCT. In: 2009 IEEE Symposium on Computational Intelligence for Image Processing, CIIP 2009, pp. 76–81. IEEE (2009)
Maehara, T., Nakai, K., Ikeda, R., Taniguchi, K., Ono, S.: Watermark design of two-dimensional barcodes on mobile phone display by evolutionary multi-objective optimization. In: Proceedings of Joint 7th International Conference on Soft Computing and Intelligent Systems and 15th International Symposium on Advanced Intelligent Systems, pp. 149–154 (2014)
Mitrea, M., Hasnaoui, M.: Semi-fragile watermarking between theory and practice. In: Proceedings of the Romanian Academy, pp. 328–327, October 2013. https://hal.archives-ouvertes.fr/hal-00941082
Nakamura, H., Gohshi, S., Fujii, R., Ito, H., Suzuki, M., Takai, S., Tani, Y.: A digital watermark that survives after re-shooting the images displayed on a CRT screen. J. Inst. Image Inf. Telev. Eng. 60(11), 1778–1788 (2006)
Ono, S., Maehara, T., Nakai, K., Ikeda, R., Taniguchi, K.: Semi-fragile watermark design for detecting illegal two-dimensional barcodes by evolutionary multi-objective optimization. In: Proceedings of Genetic and Evolutionary Computation Conference (GECCO) (Companion), pp. 175–176 (2014)
Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8(2), 300–304 (1960). http://www.jstor.org/stable/2098968
Storn, R., Price, K.: Differential evolution a simple and efficient heuristic for global optimization over continuous spaces. J. Global Optim. 11, 341–359 (1997). http://dl.acm.org/citation.cfm?id=596061.596146
Tanabe, R., Fukunaga, A.: Success-history based parameter adaptation for differential evolution. In: 2013 IEEE Congress on Evolutionary Computation (CEC), pp. 71–78, June 2013
Thiemert, S., Sahbi, H., Steinebach, M.: Using entropy for image and video authentication watermarks. In: Proceedings of the SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII. No. 607218 (2006). http://dx.org/10.1117/12.643053
Zhang, J., Sanderson, A.: JADE: adaptive differential evolution with optional external archive. IEEE Trans. Evol. Comput. 13(5), 945–958 (2009)
Acknowledgements
Part of this work was supported by SCOPE of MIC, and JSPS KAKENHI Grant Number 15H02758. The authors also would like to thank A-T Communications, Co., LTD., and DENSO WAVE Inc.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Maehara, T., Ikeda, R., Ono, S. (2016). Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes. In: Shi, YQ., Kim, H., Pérez-González, F., Echizen, I. (eds) Digital-Forensics and Watermarking. IWDW 2015. Lecture Notes in Computer Science(), vol 9569. Springer, Cham. https://doi.org/10.1007/978-3-319-31960-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-31960-5_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31959-9
Online ISBN: 978-3-319-31960-5
eBook Packages: Computer ScienceComputer Science (R0)