Watermark Recovery from a Dual Layer Hologram with a Digital Camera

  • Anu Pramila
  • Anja Keskinarkaus
  • Esa Rahtu
  • Tapio Seppänen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6688)


In this paper we present a method for reading a watermark from a dual layer hologram image with a digital camera. Here the base of the hologram out of which the hologram was designed is a binary image. The hologram obtained is placed on a planar surface and an image is captured from the hologram by setting up a light source and a digital camera on appropriate distances and angles relative to the hologram. The captured image is corrected from affine distortions and a saliency detector based segmentation is performed for the image. The watermark is read from the resulting reconstructed binary image. The obtained results show that the watermark can be recovered perfectly from a dual layer hologram with a proper setting of the camera and light sources.


Digital watermarking watermarking holograms print-cam process 


  1. 1.
    Wang, H.-C., Wang, W.-C.: Data hiding in a hologram by modified digital halftoning techniques. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1086–1092. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Lin, C.Y., Chang, S.F.: Distortion modeling and invariant extraction for digital image print-and-scan process. In: International Symposium on Multimedia Information Processing Taiwan (1999)Google Scholar
  3. 3.
    He, D., Sun, Q.: A practical print-scan resilient watermarking scheme. In: IEEE International Conference on Image Processing (ICIP), vol. 1, pp. I-257–I-260 (2005)Google Scholar
  4. 4.
    Solanki, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Estimating and Undoing Rotation for Print-scan Resilient Data Hiding. In: IEEE International Conference on Image Processing (ICIP), vol. 1, pp. 39–42 (2004)Google Scholar
  5. 5.
    Perry, B., MacIntosh, B., Cushman, D.: Digimarc MediaBridge - The birth of a consumer product, from concept to commercial application. In: Proc. of SPIE Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA, vol. 4675, pp. 118–123 (2002)Google Scholar
  6. 6.
    Stach, J., Brundage, T.J., Hannigan, B.T., Bradley, B.A., Kirk, T., Brunk, H.: On the use of web cameras for watermark detection. In: Proc. of SPIE Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA, vol. 4675, pp. 611–620 (2002)Google Scholar
  7. 7.
    Pan, H.-K., Chen, Y.-Y., Tseng, Y.-C.: A secure data hiding scheme for two-color images. In: Fifth IEEE Symposium on Computers and Communications, pp. 750–755. IEEE Press, Los Alamitos (2000)Google Scholar
  8. 8.
    Tseng, Y.-C., Pan, H.-K.: Secure and invisible data hiding in 2-color images. In: 10th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 887–896. IEEE Press, Los Alamitos (2001)Google Scholar
  9. 9.
    Rahtu, E., Heikkilä, J.: A simple and efficient saliency detector for background subtraction. In: IEEE Intl. Workshop on Visual Surveillance, Kyoto, Japan, pp. 1137–1144 (2009)Google Scholar
  10. 10.
    Pramila, A., Keskinarkaus, A., Seppänen, T.: Reading watermarks from printed binary images with a camera phone. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol. 5703, pp. 227–240. Springer, Heidelberg (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Anu Pramila
    • 1
  • Anja Keskinarkaus
    • 1
  • Esa Rahtu
    • 1
  • Tapio Seppänen
    • 1
  1. 1.Department of Electrical and Information EngineeringUniversity of OuluFinland

Personalised recommendations