Data Hiding for Binary Documents Robust to Print-Scan, Photocopy and Geometric Distortions

This paper presents a data hiding technique for printed bicolor documents. It inserts tiny dots, hardly noticeable at normal reading distance, to embed the message. For message extraction, we employ autocorrelation and tiny registration dots to rectify geometric distortions. This technique is robust to distortions resulting from print-scan operations, good quality photocopies, affine transformations and scribblings/stains on the paper. The technique can be applied to documents with large white (or black) areas and they may present characters, drawings, schematics, diagrams, cartoons, but not halftones. The technique is intended to be neither a robust watermark (because any filtering can remove the dots) nor a covert communication (because the dots are perceptible at short distance). Nevertheless, when combined with a perceptual hashing and a cryptography protocol, it can be applied as semi-fragile authentication watermarking for hardcopy two-tone documents. In some situations, the utilization of the proposed system can substitute the use of notarial authenticated photocopies.

[1]  Nazim Fatès,et al.  Public automated web-based evaluation service for watermarking schemes: StirMark benchmark , 2001, IS&T/SPIE Electronic Imaging.

[2]  Nasir D. Memon,et al.  Data hiding in binary text documents , 2001, IS&T/SPIE Electronic Imaging.

[3]  Thierry Pun,et al.  Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management , 2006, IEEE Trans. Inf. Forensics Secur..

[4]  Hae Yong Kim,et al.  A secure authentication watermarking for halftone and binary images , 2004, Int. J. Imaging Syst. Technol..

[5]  Oscar C. Au,et al.  Data hiding by smart pair toggling for halftone images , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[6]  Gabriela Csurka,et al.  Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[7]  Hae Yong Kim,et al.  Alteration-Locating Authentication Watermarking for Binary Images , 2004, IWDW.

[8]  Ching-Yung Lin Public Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process , 2000 .

[9]  Steven H. Low,et al.  Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.

[10]  M. Kutter Watermaking resisting to translation, rotation, and scaling , 1998 .

[11]  Steven H. Low,et al.  Marking text documents , 1997, Proceedings of International Conference on Image Processing.

[12]  Hong Yan,et al.  Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..

[13]  B. S. Manjunath,et al.  `Print and Scan' Resilient Data Hiding in Images , 2006, IEEE Transactions on Information Forensics and Security.

[14]  Yu-Chee Tseng,et al.  A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..

[15]  Chin-Chen Chang,et al.  Hiding Data in Binary Images , 2005, ISPEC.

[16]  Min Wu,et al.  Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.

[17]  Paulo Vinicius Koerich Borges,et al.  Text luminance modulation for hardcopy watermarking , 2007, Signal Process..

[18]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[19]  Chun-Shien Lu,et al.  Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.

[20]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[21]  Hae Yong Kim A new public-key authentication watermarking for binary document images resistant to parity attacks , 2005, IEEE International Conference on Image Processing 2005.

[22]  Ingemar J. Cox,et al.  Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..

[23]  Fernando Pérez-González,et al.  Visible encryption: using paper as a secure channel , 2003, IS&T/SPIE Electronic Imaging.