Combinatorial Bounds and Algorithmic Aspects of Image Matching under Projective Transformations
MFCS '08 Proceedings of the 33rd international symposium on Mathematical Foundations of Computer Science
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Performance Comparison of Digital Watermarking for Scanned Document in RGB and YCbCr Channels
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Efficient general print-scanning resilient data hiding based on uniform log-polar mapping
IEEE Transactions on Information Forensics and Security
Distributed image coding for digital image recovery from the print-scan channel
IEEE Transactions on Image Processing
Journal of Systems and Software
Orientation modulation for data hiding in clustered-dot halftone prints
IEEE Transactions on Image Processing
Image watermarking with feature point based synchronization robust to print-scan attack
Journal of Visual Communication and Image Representation
Watermark detection for video bookmarking using mobile phone camera
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Hi-index | 0.00 |
Print-scan resilient data hiding finds important applications in document security and image copyright protection. This paper proposes methods to hide information into images that achieve robustness against printing and scanning with blind decoding. The selective embedding in low frequencies scheme hides information in the magnitude of selected low-frequency discrete Fourier transform coefficients. The differential quantization index modulation scheme embeds information in the phase spectrum of images by quantizing the difference in phase of adjacent frequency locations. A significant contribution of this paper is analytical and experimental modeling of the print-scan process, which forms the basis of the proposed embedding schemes. A novel approach for estimating the rotation undergone by the image during the scanning process is also proposed, which specifically exploits the knowledge of the digital halftoning scheme employed by the printer. Using the proposed methods, several hundred information bits can be embedded into images with perfect recovery against the print-scan operation. Moreover, the hidden images also survive several other attacks, such as Gaussian or median filtering, scaling or aspect ratio change, heavy JPEG compression, and rows and/or columns removal