Abstract
An algorithm of high-capacity blind text watermarking is presented that is robust to print-and-scan operations. First, binary images of Chinese text characters are segmented depends on the complexity of the characters: each character image is segmented to embedded part, adjust part, and dislodge part. After segmentation, a quantization function is built on the basis of invariables during printing-scanning. The watermark is embedded via the strategy of flipping pixels at the characters boundaries. This method exploits human visual masking characteristics to reduce the distortion degree in the text image. Experimental results indicate that the method is robust to common attacks and the watermark can be extracted without original document.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding-a survey. Proc. IEEE 87, 1062–1078 (1999)
Kim, H.Y., Mayer, J.: Data hiding for binary document robust to print-scan, photocopy and geometric distortion. In: Proc. 10th Brazilian Symposium on Computer Graphics and Image Processing, Washington, DC, USA, pp. 105–112 (2007)
Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing 6, 1673–1687 (1997)
Kim, J., et al.: Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents. Signal Processing: Image Communication 25, 559–576 (2010)
Brassil, J., Low, S., Maxemchuk, N.: Copyright protection for the electronic distribution of text documents. Proc. IEEE 87, 1181–1196 (1999)
Liu, Y., Sun, X., Gan, C.: An efficient linguistic steganography for Chinese text. In: Proc. ICME 2007, Beijing, pp. 2094–2097 (2007)
Sun, X., Chen, H.: Mathematical representation of a Chinese character and its applications. International Journal of Pattern Recognition and Artificial Intelligence 16, 735–747 (2002)
Qi, W., Li, X., Yang, B., Cheng, D.-F.: Document watermarking scheme for information tracking. Journal of Communications 29, 183–190 (2008)
Yang, H., Kot, A.C.: Pattern-based data hiding for binary image authentication by connectivity preserving. IEEE Transactions on Multimedia 9, 475–486 (2007)
Wu, M., Liu, B.: Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia 6, 528–538 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, D., You, M., Kim, J. (2012). High-Capacity Blind Binary Text Document Watermarking Scheme Robust to Print-and-Scan Operations. In: Kim, Th., Kang, JJ., Grosky, W.I., Arslan, T., Pissinou, N. (eds) Computer Applications for Bio-technology, Multimedia, and Ubiquitous City. BSBT MulGraB IUrC 2012 2012 2012. Communications in Computer and Information Science, vol 353. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35521-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-35521-9_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35520-2
Online ISBN: 978-3-642-35521-9
eBook Packages: Computer ScienceComputer Science (R0)