The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid growth in information and communication technologies provides ways for some people to forge printed documents. Digital watermarking is widely used for authenticating digital documents. By embedding some watermarks in the printed documents in a way not to be observed by human eyes we may stop these forgeries. While a printed document requires another procedure to extract the embedded watermark...
A data extraction method from data embedding printing images by capturing devices like scanners or mobile cameras has attracted much attention. This method has several problems to be solved, which is different with the digital image watermarking. In the method, consideration for geometrical deformation, especially rotations, in the data extraction process is essential. For the correction, addition...
In this paper, we consider the problem of extracting the embedded watermark from the printed and scanned watermarked images. Since in a practical situation, the parameters settings in the printing and scanning processes between users are different, recovering the embedded watermark from the watermarked paper, after being scanned back to the computer, is difficult and contains high amount of errors...
Forgeries related with official printed documents can easily be performed with the aid of today's advanced electronic devices such as scanners and computers. The forged documents are usually undetectable by human eyes and it is with this regard that there is an urgent need to find solutions to the threat of counterfeiting of such documents. With watermarking technique, information that is used to...
This paper investigates hardcopy watermarking based on the embedding of transparent logos into documents. Grayscale logos are embedded into specific locations of the text document aiming communication over the print-and-scan (PS) channel. The authenticating message is encoded into the document by selecting the relative position of the logos. At the detector, the logo positions are estimated by correlation...
In recent years, a lot of research has been conducted into watermarking for the purpose of protecting the copyright of a variety of electronic content. Very recently, watermarking methods that resist analog conversion, such as that for printing, have been studied and systems have been proposed that provide instructions for converting from analog to digital data, such as those for mobile telephones...
In this paper, a very robust data hiding method is proposed to embed a watermark into a dispersed ordered dithered halftone image by exploiting both the properties of Hilbert curve and dispersed ordered dither matrix. The proposed method hides data by swapping neighboring pixels along Hilbert curve. The experimental results show that the proposed method is very robust. The correct decoding rate is...
One Anti-scanning & printing digital watermark algorithm is studied which can be used in electronic seal Anti-counterfeiting system. Spread spectrum coding strategy is used for embedding the watermark of bigger capacity. The experimental results show that the algorithm can withstand pixel distortion and geometry distortion at the same time which can be used in digital watermark of the electronic...
This paper describes a method for hiding data inside printed text documents that is resilient to print/scan and photocopying operations. Using the principle of channel coding with side information, the embedder inserts a message into a text document while treating the content of the document as known interference. The data is embedded by making small changes to text characters before the document...
Considering the simple and weak structure of binary texts, this paper proposes a novel algorithm which combines the methods of Block Partition, Discrete Cosine Transform (DCT) and pixel flipping. Based on appropriate block partition, the matrix of each block's characteristic values is transformed into the DCT domain, and a DCT coefficient matrix generated. Then, some high-frequency DCT coefficients...
A data embedding to printed images has become an important issue for several applications. In this paper, we assume an original image to be known and the server based data retrieval model, and a new method for the data embedding to the printed images is proposed. For data embedding to printed image, a method using spread spectrum technique has already been proposed. However, there are two problems...
In this paper, we introduce a watermarking algorithm for halftone image. The arithmetic is based on HVS and multiscale error diffusion. We insert special binary image in the halftone image and study on it after printing and scanning. Using the proposed methods, several hundred information bits can be embedded into images with perfect recovery against the print-scan operation. Different printing resolution,...
Covert exchange of information has been long a significant and highlighted affair. Numerous methods have been devised for the matter of which steganography is a popular one. Already applied in the past, the method has been massive used following the invention of computer. This paper discusses a new application of steganography in textiles in which information is hidden in the images on the clothes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.