Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding

  • Anu Pramila
  • Anja Keskinarkaus
  • Tapio Seppänen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5041)


In this paper, we propose a print-scan resilient watermarking method which takes advantage of multiple watermarking. The method presented here consists of three separate watermarks out of which two are used for inverting the geometrical transformations and the third is the multibit message watermark. A circular template watermark is embedded in magnitudes of the Fourier transform to invert rotation and scale after print-scan process and another template watermark is embedded in spatial domain to invert translations. The message watermark is embedded in wavelet domain and watermark robustness in both approximation coefficient and detail coefficients is tested. Blind, cross-correlation based methods are utilized to extract the watermarks. The obtained success ratios were at least 91% with JPEG and JPEG200 quality factors of 80-100 and scanner resolution of 300dpi. The BER obtained with the previous settings was less than 1.5%.


Digital image watermarking multiple watermarking inversion JPEG JPEG2000 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kutter, M.: Watermarking resisting to translation, rotation and scaling. In: Proc. of SPIE Multimedia Systems and Applications, vol. 3528, pp. 423–431 (1998)Google Scholar
  2. 2.
    Deguillaume, F., Voloshynovskiy, S., Pun, T.: Method for the Estimation and Recovering from General Affine Transforms. In: Proc. of SPIE, Electronic Imaging, 2002, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 313–322 (2002)Google Scholar
  3. 3.
    Pereira, S., Pun, T.: Robust Template Matching for Affine Resistant Image Watermarks. IEEE Trans. on Image processing 9(6), 1123–1129 (2000)CrossRefGoogle Scholar
  4. 4.
    Lee, J.-S., Kim, W.-Y.: A Robust Image Watermarking Scheme to Geometrical Attacks for Embedment of Multibit Information. In: Proc. of Advances in Multimedia Information Processing, 5th Pacific Rim Conference on Multimedia, vol. 355, pp. III-348–355 (2004)Google Scholar
  5. 5.
    Chiu, Y.-C., Tsai, W.-H.: Copyright Protection against Print-and-Scan Operations by Watermarking for Colour Images Using Coding and Synchronization of Peak Locations in Frequency Domain. WCVGIP 2006, Taiwan, Journal of information science and engineering 22, 483–496 (2006)Google Scholar
  6. 6.
    O’Ruanaidh, J.J.K., Pun, T.: Rotation, scale and translation invariant digital image watermarking. IEEE Proc. of ICIP 1997 1, 536–539 (1997)Google Scholar
  7. 7.
    Bas, P., Chassery, J.-M., Marq, B.: Geometrically Invariant Watermarking Using Feature Points. IEEE Trans. on Image Processing 11, 1014–1028 (2002)CrossRefGoogle Scholar
  8. 8.
    Chou, C.-H., Li, Y.-C.: A Perceptually Tuned Subband Image Coder Based on the Measure of Just-Noticeable-Distortion Profile. IEEE Trans. on Circuits and Systems for Video Technology 5(6), 467–476 (1995)CrossRefGoogle Scholar
  9. 9.
    He, D., Sun, Q.: A Practical Print-scan Resilient Watermarking Scheme. IEEE Proc. of ICIP 2005 1, 257–260 (2005)Google Scholar
  10. 10.
    Solanki, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Estimating and Undoing Rotation for Print-scan Resilient Data Hiding. In: IEEE International Conference on Image Processing, vol. 1, pp. 39–42 (2004)Google Scholar
  11. 11.
    Perry, B., MacIntosh, B., Cushman, D.: Digimarc MediaBridge -The birth of a consumer product, from concept to commercial application. In: Proc. of SPIE Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 118–123 (2002)Google Scholar
  12. 12.
    Pramila, A.: Watermark synchronization in camera phones and scanning devices. Master’s thesis, Department of electrical information engineering, University of Oulu, Oulu, p.83Google Scholar
  13. 13.
    Keskinarkaus, A., Pramila, A., Seppänen, T., Sauvola, J.: A Wavelet Domain Print-scan and JPEG Resilient Data Hiding Method. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 82–95. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  14. 14.
    Barni, M., Bartolini, F., Capellini, V., Lippi, A., Piva, A.: A DWT-based technique for spatio-frequency masking of digital signatures. In: Proc. of the SPIE/IS&T International Conference on Security and Watermarking of Multimedia Contents, vol. 3657, pp. 31–39 (1999)Google Scholar
  15. 15.
    Lin, C.-Y., Chang, S.-F.: Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process. In: ISMIP 1999 (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Anu Pramila
    • 1
  • Anja Keskinarkaus
    • 1
  • Tapio Seppänen
    • 1
  1. 1.MediaTeam Oulu, Department of Electrical and Information EngineeringUniversity of OuluFinland

Personalised recommendations