Advertisement

Digital Image Anti-counterfeiting Technology

  • Chin-Ling Chen
  • Chin-Feng Lee
  • Fang-Wei Hsu
  • Yong-Yuan DengEmail author
  • Ching-Cheng Liu
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 97)

Abstract

There are many trademarks and logos around the world. Every trademark or logo represents its own brand or intellectual property. However, some people who are interested will benefit from counterfeiting trademarks or logos. As the number of counterfeit cases has increased, the technology of anti-counterfeiting has gradually been taken. Watermark is the protection method of today’s trademarks. Since the naked eye cannot guarantee the recognition rate, this study uses scientific and technical testing methods to distinguish the authenticity of the trademark. Through the method of this study combined with watermarking technology, not only the problem of misjudgment is improved, but also the location and area where the image has been tampered with can be accurately determined. It also enhances image recovery and image quality in tamper areas.

Keywords

Trademark protection Anti-counterfeiting Watermarking technology 

Notes

Acknowledgments

This research was supported by the Ministry of Science and Technology, Taiwan, R.O.C., under contract number MOST 108-2221-E-324-013 and MOST 108-2221-E-324-014.

References

  1. 1.
    Yan, G., Olariu, S., Weigle, M.C.: Providing VANET security through active position detection. Comput. Commun. 31(12), 2883–2897 (2008)CrossRefGoogle Scholar
  2. 2.
    Hu, P.Y., Chang, C.: Novel image authentication scheme based on quadtree segmentation. Imaging Sci. J. 53(3), 149–162 (2005)CrossRefGoogle Scholar
  3. 3.
    Parah, S.A., Sheikh, J.A., Loan, N.A., Bhat, G.M.: Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit. Signal Process. 53, 11–24 (2016)CrossRefGoogle Scholar
  4. 4.
    Singh, A.K.: Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed. Tools Appl. 76(6), 8881–8900 (2017)CrossRefGoogle Scholar
  5. 5.
    Zear, A., Singh, A.K., Kumar, P.: A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed. Tools Appl. 77(4), 4863–4882 (2018)CrossRefGoogle Scholar
  6. 6.
    Ansari, I.A., Pant, M., Ahn, C.W.: SVD based fragile watermarking scheme for tamper localization and self-recovery. Int. J. Mach. Learn. Cybern. 7(6), 1225–1239 (2016)CrossRefGoogle Scholar
  7. 7.
    Lee, C.F., Shen, J.J., Chen, Z.R., Agrawal, S.: Self-embedding authentication watermarking with effective tampered location detection and high-quality image recovery. Sensors 19(10), 2267 (2019)CrossRefGoogle Scholar
  8. 8.
    Chen, F., He, H., Huo, Y.: Self-embedding watermarking scheme against JPEG compression with superior imperceptibility. Multimed. Tools Appl. 76(7), 9681–9712 (2017)CrossRefGoogle Scholar
  9. 9.
    Espejel-Trujillo, A., Castillo-Camacho, I., Nakano-Miyatake, M., Perez-Meana, H.: Identity document authentication based on VSS and QR codes. Procedia Technol. 3, 241–250 (2012)CrossRefGoogle Scholar
  10. 10.
    Tiwari, A., Sharma, M., Tamrakar, R.K.: Watermarking based image authentication and tamper detection algorithm using vector quantization approach. AEU-Int. J. Electron. Commun. 78, 114–123 (2017)CrossRefGoogle Scholar
  11. 11.
    Park, S.K., Miller, K.W.: Random number generators: good ones are hard to find. Commun. ACM 31(10), 1192–1201 (1988)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Chin-Ling Chen
    • 1
    • 2
    • 3
  • Chin-Feng Lee
    • 4
  • Fang-Wei Hsu
    • 5
  • Yong-Yuan Deng
    • 1
    Email author
  • Ching-Cheng Liu
    • 6
  1. 1.Department of Computer Science and Information EngineeringChaoyang University of TechnologyTaichungTaiwan, R.O.C.
  2. 2.School of Information EngineeringChangchun Sci-Tech UniversityChangchunChina
  3. 3.School of Computer and Information EngineeringXiamen University of TechnologyXiamenPeople’s Republic of China
  4. 4.Department of Information ManagementChaoyang University of TechnologyTaichungTaiwan, R.O.C.
  5. 5.Department of Management Information SystemsNational Chung Hsing UniversityTaichungTaiwan
  6. 6.Department of Information and Communication EngineeringChaoyang University of TechnologyTaichungTaiwan, R.O.C.

Personalised recommendations