Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles
A number of techniques have been recently proposed to prevent unauthorized user from illegal copying or redistribution of multimedia contents. One approach for copy protection is robust watermarking technique that purposes to resist several attacks such as signal processing, geometric distortion, etc. On the country to robust watermarking, the other approach is fragile watermarking that purposes to detect slight changes to the watermarked contents. In this paper we find out the problems of a marking and identification scheme for document images using one directional diagonal profile that we proposed. And then we suggest robust watermarking technique to resolve these problems using bi-direction diagonal profiles; left-directional diagonal profile and right-directional diagonal profile. According to this robust watermarking technique, it can reduce the side information, which needs in watermark extraction procedure and find the pixel position on document image with only the indexes of bi-directional diagonal profiles. Finally, in addition to robust watermarking scheme, we suggest fragile watermarking technique that can locate or characterize the forged region using the feature of bi-directional diagonal profiles and reverse process.
Unable to display preview. Download preview PDF.
- 1.R. Jain, R. Kasturi, B. G. Schunck, “Machine Vision”, MaGraw-Hill, 1995.Google Scholar
- 2.S. H. Low, N. F. Maxemchuk, J. T. Brassil, and L. O'Gorman, “Document Marking and Identification Using Both Line and Word Shifting”, in Proc. Infocom’ 95, pp. 853–860, April, 1995.Google Scholar
- 3.J. T. Brassil, S. H. Low, N. F. Maxemchuk, and L. O'Gorman, “Hiding Information in Document Images”, in Proc. 1995 Conf. Information Sciences and Systems, pp.482–489, March 1995.Google Scholar
- 4.J. T. Brassil, S. H. Low, N. F. Maxemchuk, L. O'Gorman, “Electronic Marking and Identification Techniques to Discourage Document Copying”, in IEEE J. Selected Area Commun. Vol. 13, pp. 1495–1504, Oct. 1995.Google Scholar
- 5.I. Cox, J. Killian, T. Leighton and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia”, in Proc. of First Int. Workshop of Information Hiding, pp 183–206, May. 1996.Google Scholar
- 6.S. H. Low, N. F. Maxemchuk and A. M. Lapone, “Document Identification for Copyright Protection Using Centroid Detection”, in IEEE Trans. Commun. Vol. 46, pp. 372–383, March 1998Google Scholar
- 7.S. H. Low, A. M. Lapone, N. F. Mexemchuk, “Performance Comparison of Two Text Marking and Detection Methods”, in IEEE J. Selected Areas Communication, Vol. 16, No. 14, May 1998.Google Scholar
- 8.J. T. Brassil, S. H. Low, N. F. Maxemchuk, “Copyright Protection for the Electronic Distribution of Text Documents”, in Proc. of the IEEE, Vol. 87, No. 7, July 1999.Google Scholar
- 9.Y. Lui, J. Mant, E. Wong, S. H. Low, “Marking and Detection of Text Documents Using Transform-domain Techniques”, in SPIE Vol.3657, Jan. 1999.Google Scholar
- 10.E. T. Lin, E. J. Delp, “A Review of Fragile Image Watermarks”, in Proc. of Multimedia & Security Workshop (ACM Multimedia '99), Multimedia Contents, pp. 25–29, 1999Google Scholar
- 11.L. Miller, I. J. Cox, J. M. Linartz, T. Kalker, “A Review of Watermarking Principles and Properties”, in Digital Signal Processing Multimedia System, pp. 461–485, 1999.Google Scholar
- 12.J. H. Park, S. E. Jeong, Y. Huh “A New Digital Watermarking for Text Document Images Using Diagonal Profile”, toappear in IEEE Pacific-Rim Conf. on Multimedia, Oct., 2001Google Scholar