Skip to main content

Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9569))

Included in the following conference series:

  • 1176 Accesses

Abstract

Two-dimensional barcodes (2D codes) have become common as an authentification way of e-tickets and e-coupons. However, easy replication by using other mobile phone camera is apprehended. This paper proposes a method for detecting copied 2D code by a semi-fragile digital video watermark which can be destroyed by replication. Compared to digital image watermarking, it is more difficult to copy 2D code in which the time-varying watermark is embedded without destroying the watermark. In the proposed method, the video watermarking scheme is optimized to maximize the difference of the watermark extraction degree between valid and replicated 2D code videos. The optimization is performed using a novel self-adaptive differential evolution algorithm with actual mobile devices rather than simulation. Experimental results have shown that the proposed method successfully designs a video watermarking scheme which allows authenticity determination of 2D codes displayed on mobile device screen.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Values of m and n were determined by referring to JPEG compression.

References

  1. Anqiang, L., Jing, L.: A novel scheme for robust video watermark in the 3D-DWT domain. In: 2007 The First International Symposium on Data, Privacy, and E-Commerce, ISDPE 2007, pp. 514–516. IEEE (2007)

    Google Scholar 

  2. Chen, A.H.L., Chyu, C.C.: A memetic algorithm for maximizing net present value in resource-constrained project scheduling problem. In: Proceedings of IEEE World Congress on Computational Intelligence, pp. 2401–2408 (2008)

    Google Scholar 

  3. Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  4. Chu, S.C., Huang, H.C., Shi, Y., Wu, S.Y., Shieh, C.S.: Genetic watermarking for zerotree-based applications. Circ. Syst. Sig. Process. 27(2), 171–182 (2008). http://dx.org/10.1007/s00034-008-9025-z

    Article  Google Scholar 

  5. Das, S., Suganthan, P.N.: Differential evolution: a survey of the state-of-the-art. IEEE Trans. Evol. Comput. 15(1), 4–31 (2011)

    Article  Google Scholar 

  6. Huang, H.C., Chu, S.C., Pan, J.S., Huang, C.Y., Liao, B.Y.: Tabu search based multi-watermarks embedding algorithm with multiple description coding. Inf. Sci. 181(16), 3379–3396 (2011). http://www.sciencedirect.com/science/article/pii/S0020025511001757

    Article  Google Scholar 

  7. Huang, H.Y., Yang, C.H., Hsu, W.H.: A video watermarking algorithm based on pseudo 3D DCT. In: 2009 IEEE Symposium on Computational Intelligence for Image Processing, CIIP 2009, pp. 76–81. IEEE (2009)

    Google Scholar 

  8. Maehara, T., Nakai, K., Ikeda, R., Taniguchi, K., Ono, S.: Watermark design of two-dimensional barcodes on mobile phone display by evolutionary multi-objective optimization. In: Proceedings of Joint 7th International Conference on Soft Computing and Intelligent Systems and 15th International Symposium on Advanced Intelligent Systems, pp. 149–154 (2014)

    Google Scholar 

  9. Mitrea, M., Hasnaoui, M.: Semi-fragile watermarking between theory and practice. In: Proceedings of the Romanian Academy, pp. 328–327, October 2013. https://hal.archives-ouvertes.fr/hal-00941082

  10. Nakamura, H., Gohshi, S., Fujii, R., Ito, H., Suzuki, M., Takai, S., Tani, Y.: A digital watermark that survives after re-shooting the images displayed on a CRT screen. J. Inst. Image Inf. Telev. Eng. 60(11), 1778–1788 (2006)

    Google Scholar 

  11. Ono, S., Maehara, T., Nakai, K., Ikeda, R., Taniguchi, K.: Semi-fragile watermark design for detecting illegal two-dimensional barcodes by evolutionary multi-objective optimization. In: Proceedings of Genetic and Evolutionary Computation Conference (GECCO) (Companion), pp. 175–176 (2014)

    Google Scholar 

  12. Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8(2), 300–304 (1960). http://www.jstor.org/stable/2098968

    Article  MathSciNet  MATH  Google Scholar 

  13. Storn, R., Price, K.: Differential evolution a simple and efficient heuristic for global optimization over continuous spaces. J. Global Optim. 11, 341–359 (1997). http://dl.acm.org/citation.cfm?id=596061.596146

    Article  MathSciNet  MATH  Google Scholar 

  14. Tanabe, R., Fukunaga, A.: Success-history based parameter adaptation for differential evolution. In: 2013 IEEE Congress on Evolutionary Computation (CEC), pp. 71–78, June 2013

    Google Scholar 

  15. Thiemert, S., Sahbi, H., Steinebach, M.: Using entropy for image and video authentication watermarks. In: Proceedings of the SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII. No. 607218 (2006). http://dx.org/10.1117/12.643053

  16. Zhang, J., Sanderson, A.: JADE: adaptive differential evolution with optional external archive. IEEE Trans. Evol. Comput. 13(5), 945–958 (2009)

    Article  Google Scholar 

Download references

Acknowledgements

Part of this work was supported by SCOPE of MIC, and JSPS KAKENHI Grant Number 15H02758. The authors also would like to thank A-T Communications, Co., LTD., and DENSO WAVE Inc.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Satoshi Ono .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Maehara, T., Ikeda, R., Ono, S. (2016). Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes. In: Shi, YQ., Kim, H., Pérez-González, F., Echizen, I. (eds) Digital-Forensics and Watermarking. IWDW 2015. Lecture Notes in Computer Science(), vol 9569. Springer, Cham. https://doi.org/10.1007/978-3-319-31960-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31960-5_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31959-9

  • Online ISBN: 978-3-319-31960-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics