2,359 Hits in 4.3 sec

Modeling the print-scan process for resilient data hiding

Kaushal Solanki, Upamanyu Madhow, Bangalore S. Manjunath, Shivkumar Chandrasekaran, Edward J. Delp III, Ping W. Wong
2005 Security, Steganography, and Watermarking of Multimedia Contents VII  
In this paper, we build upon our previous work on print-scan resilient data hiding with the goal of providing a simple mathematical characterization for guiding the design of more sophisticated methods  ...  Print-scan resilient data hiding finds important applications in document security, and image copyright protection.  ...  PRINT-SCAN RESILIENT DATA HIDING In this section, we provide an overview of our previous work on print-scan resilient data hiding (see 11 for details).  ... 
doi:10.1117/12.588002 dblp:conf/sswmc/SolankiMMC05 fatcat:uqlfdt2kczbopezr7azbjijrxm

`Print and Scan' Resilient Data Hiding in Images

Kaushal Solanki, Upamanyu Madhow, B. S. Manjunath, Shiv Chandrasekaran, Ibrahim El-Khalil
2006 IEEE Transactions on Information Forensics and Security  
Print-scan resilient data hiding finds important applications in document security and image copyright protection.  ...  A significant contribution of this paper is analytical and experimental modeling of the print-scan process, which forms the basis of the proposed embedding schemes.  ...  ACKNOWLEDGMENT We thank the anonymous reviewers for their careful reading and insightful comments, which greatly helped improve the clarity of the paper. We would also like to thank J.  ... 
doi:10.1109/tifs.2006.885032 fatcat:q2kzcdjiwzh57iyyk5xdaesy5i

Adaptive decoding for halftone orientation-based data hiding

Orhan Bulan, Gaurav Sharma, Vishal Monga
2008 2008 15th IEEE International Conference on Image Processing  
The print-scan process inherent in these applications introduces distortions whose characteristics exhibit a strong spatial dependence on the cover image in which the data is embedded.  ...  We show this advantage in the specific context of a high rate data embedding method that utilizes orientation modulation for data embedding in clustered dot halftones and moment based detection at the  ...  El-Khalil, "Print and scan resilient data hiding in images," IEEE Trans. Info.  ... 
doi:10.1109/icip.2008.4711996 dblp:conf/icip/BulanSM08 fatcat:2p5prdhmkngyjes5cekvhfytku

Capacity Analysis For Orthogonal Halftone Orientation Modulation Channels

O. Bulan, V. Monga, G. Sharma
2012 IEEE Transactions on Image Processing  
ACKNOWLEDGMENT The authors thank P. Moulin for suggesting that they explore exact numerical evaluation of capacity instead of the bounds previously reported in [1] .  ...  The authors also thank anonymous reviewers of their related paper [5] , who rekindled their interest in the analysis through their remarks on that manuscript.  ...  Results provide crucial insights for orientation-modulationbased print-scan resilient data hiding.  ... 
doi:10.1109/tip.2011.2155078 pmid:21606032 fatcat:bd4qjn7gizcg7k5r3n3e2izbhm

A Practical Print-and-Scan Resilient Watermarking for High Resolution Images [chapter]

Yongping Zhang, Xiangui Kang, Philipp Zhang
2009 Lecture Notes in Computer Science  
To our best knowledge, our work also first addresses the issues of print-and-scan resilient watermarking for high resolution images.  ...  This may defeat a watermarking scheme, especially for the print-scanning of high resolution image. This paper proposes an effective pilot-based watermarking algorithm for the print-and-scan process.  ...  Print-and-scan resilient data hiding provides a viable authentication mechanism via the multi-bit watermark hidden in a picture in the document.  ... 
doi:10.1007/978-3-642-04438-0_9 fatcat:ja25loigpzb7zgxicmrsj4pel4

Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication

L. Tan, X. Sun, G. Sun
2012 Radioengineering  
Print-scan resilient watermarking has emerged as an attractive way for document security. This paper proposes an stroke direction modulation technique for watermarking in Chinese text images.  ...  Moreover, shuffling is applied to equalize the uneven embedding capacity. For the data detection, denoising and deskewing mechanisms are used to compensate for the distortions induced by hardcopy.  ...  Recent developments of watermarking resilient to print-scan (PS for abbr.) or geometric attacks focus on continuous-tone images [4] [5] [6] .  ... 
doaj:685cbb187f164ad09ca9cff908902ac3 fatcat:2sdcau3fzjednkuawk5flhcame

Data hiding in curves with application to fingerprinting maps

Hongmei Gou, Min Wu
2005 IEEE Transactions on Signal Processing  
This paper presents a new data hiding method for curves.  ...  , printing-and-scanning, and some of their combinations.  ...  Moulin and the anonymous reviewers for their comments and suggestions that have helped improve the quality and the clarity of the paper.  ... 
doi:10.1109/tsp.2005.855411 fatcat:d6bu4icrufdy3esl22vb4z3bmq

Data hiding in hard-copy text documents robust to print, scan and photocopy operations

Avinash L. Varna, Shantanu Rane, Anthony Vetro
2009 2009 IEEE International Conference on Acoustics, Speech and Signal Processing  
This paper describes a method for hiding data inside printed text documents that is resilient to print/scan and photocopying operations.  ...  Index Terms-Watermarking, data hiding, printed text documents, channel coding with encoder side information.  ...  Operations such as printing, scanning and photocopying, as well as any intentional modifications made by an attacker are modelled by a noisy channel.  ... 
doi:10.1109/icassp.2009.4959854 dblp:conf/icassp/VarnaRV09 fatcat:kzcueg2ygvcf3gqn6rp7ybpb2y

Stegnography in video files using Multivariate Regression and Flexible Macroblock Ordering

Anila Chandran
2014 IOSR Journal of Computer Engineering  
In general, there are two types of data hiding for video: one that hides the video content itself (video encryption or scrambling) so that nobody understands what is being transmitted; the other that embeds  ...  Data hiding consists of two sets of data, namely the cover medium and the embedding data, which is called the message.  ...  Kaushal Solanki proposed two methods to hide information into images in "Print and Scan" Resilient Data Hiding in Images.  ... 
doi:10.9790/0661-16592428 fatcat:he4f4ts3kbc2lmytj3q7rueha4

A Steganography Approach for Printed Image Based on Image Complexity and Template Matching

Caiyin Wang, Chao Li
2014 Open Automation and Control Systems Journal  
Based on these properties, image complexity and template matching theories, this paper proposes a steganography approach for data-hiding in printed image.  ...  Robustness and invisibility against distortions caused by image processing and printing are the essential properties for image watermarking to be applicable in real-world applications.  ...  In the following, the results of evaluating the proposed data hiding algorithm for robustness against a range of common screening and scanning attacks and geometric distortion are presented.  ... 
doi:10.2174/1874444301406010084 fatcat:eeymvkg34bd4jax5zlvft4adii

Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding [chapter]

Anu Pramila, Anja Keskinarkaus, Tapio Seppänen
2008 Lecture Notes in Computer Science  
In this paper, we propose a print-scan resilient watermarking method which takes advantage of multiple watermarking.  ...  A circular template watermark is embedded in magnitudes of the Fourier transform to invert rotation and scale after print-scan process and another template watermark is embedded in spatial domain to invert  ...  , after print-scan process.  ... 
doi:10.1007/978-3-540-92238-4_22 fatcat:sdbnvw3pqbck5dqaxucxloasya

Hologram-based watermarking capable of surviving print-scan process

Shuozhong Wang, Sujuan Huang, Xinpeng Zhang, Wei Wu
2010 Applied Optics  
Most importantly, the proposed hologram-based watermarking can withstand the printing-scanning attack and, therefore, is useful in protecting copyright of digital photographs both as electronic and hardcopy  ...  Adjusting the watermark placement in a data array, a trade-off between transparency and robustness is achieved.  ...  In view of this, modeling the print-scan process and incorporating it into the hologram-based watermarking scheme will be an important research topic.  ... 
doi:10.1364/ao.49.001170 pmid:20197815 fatcat:yu7y6yywirdslhszzhn3k5rxim

Improved Watermarking Scheme Resistant to Print-Scan

XU Junfeng, GUO Chengqing, Fang Jingjing
2012 International Journal of Digital Content Technology and its Applications  
Based on the existing text digital watermarking algorithm which has a strong resistance to print and scan process, this paper proposed an improved watermarking algorithm.  ...  Finally, the improvements predicted by the theory are verified in a number of experiments. Robustness analysis shows the proposed scheme has several advantages.  ...  Recover of Embedded Data Step 1: Segment the document image passed the print and scan process into part A and B like the embedding process.  ... 
doi:10.4156/jdcta.vol6.issue15.51 fatcat:y623bpyrffczzezybmr5q4cq3y

Watermarking in E-commerce

Peyman Rahmati, Andy Adler, Thomas Tran
2013 International Journal of Advanced Computer Science and Applications  
A major challenge for E-commerce and contentbased businesses is the possibility of altering identity documents or other digital data.  ...  For authentication purposes, a user/customer is asked to upload a scanned picture of a passport or ID card through the internet to fulfill a transaction online.  ...  Solanki et al. proposed a print-scan resilient data hiding algorithm analyzing halftone effect (intensity shift) occurred after print-and-scan operation for the sake of presenting a model of print-and-scan  ... 
doi:10.14569/ijacsa.2013.040634 fatcat:lkw6fkxa2bde5m4ibxtnzou5ra

Fingerprinting Curves [chapter]

Hongmei Gou, Min Wu
2005 Lecture Notes in Computer Science  
The extension from hiding data in 2D topographic maps to 3D elevation data sets is also discussed.  ...  This paper presents a new method for robust data hiding in curves and highlights potential applications including digital fingerprinting of map document for trace and track purposes.  ...  These are common geometric transformations and can well model common scenarios in printing-and-scanning.  ... 
doi:10.1007/978-3-540-31805-7_2 fatcat:dkhv2ecv7fec7hvxzzyld7ll5i
« Previous Showing results 1 — 15 out of 2,359 results