Skip to main content
Erschienen in: International Journal on Document Analysis and Recognition (IJDAR) 3/2020

11.08.2020 | Original Paper

A robust watermarking approach for security issue of binary documents using fully convolutional networks

verfasst von: Vinh Loc Cu, Trac Nguyen, Jean-Christophe Burie, Jean-Marc Ogier

Erschienen in: International Journal on Document Analysis and Recognition (IJDAR) | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Motivated by increasing possibility of the tampering of genuine documents during a transmission over digital channels, we focus on developing a watermarking framework for determining whether a received document is genuine or falsified, which is performed by hiding a security feature or secret information within it. To begin with, the input document is transformed into a standard form to minimize geometric distortion. Fully convolutional network (FCN) is utilized to detect document’s watermarking regions. Next, we construct hiding patterns used for hiding secret information. Modifying pixel values of these patterns for carrying secret bits depends on the edge and corner features of document content and the connectivity of their neighboring pixels. Lastly, the watermarking process is conducted by either changing the center pixel of the hiding patterns or changing the ratio between the number of edge features and the number of corner features of subregions within the watermarking regions. The experiments are performed on various binary documents, and our approach gives competitive performance compared to state-of-the-art approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Apostolos, A., Bridson, D., Papadopoulos, C., Pletschacher, S.: A realistic dataset for performance evaluation of document layout analysis. ICDAR ’09 (2009) Apostolos, A., Bridson, D., Papadopoulos, C., Pletschacher, S.: A realistic dataset for performance evaluation of document layout analysis. ICDAR ’09 (2009)
4.
Zurück zum Zitat Benoraira, A., Benmahammed, K., Boucenna, N.: Blind image watermarking technique based on differential embedding in DWT and DCT domains. EURASIP 2015(1), 55 (2015) Benoraira, A., Benmahammed, K., Boucenna, N.: Blind image watermarking technique based on differential embedding in DWT and DCT domains. EURASIP 2015(1), 55 (2015)
5.
Zurück zum Zitat Bay, H., Ess, A., Tuytelaars, T., Van Gool, L.: Speeded-up robust features (surf). Comput. Vis. Image Underst., (2008) Bay, H., Ess, A., Tuytelaars, T., Van Gool, L.: Speeded-up robust features (surf). Comput. Vis. Image Underst., (2008)
6.
Zurück zum Zitat Cao, H., Kot, A.C.: On establishing edge adaptive grid for bilevel image data hiding. IEEE Trans. Inf. Forensics Secur. 8(9), 1508–1518 (2013)CrossRef Cao, H., Kot, A.C.: On establishing edge adaptive grid for bilevel image data hiding. IEEE Trans. Inf. Forensics Secur. 8(9), 1508–1518 (2013)CrossRef
7.
Zurück zum Zitat Cheng, J., Kot, A.C.: Objective distortion measure for binary text image based on edge line segment similarity. IEEE Trans. Image Process. 16(6), 1691–1695 (2007)MathSciNetCrossRef Cheng, J., Kot, A.C.: Objective distortion measure for binary text image based on edge line segment similarity. IEEE Trans. Image Process. 16(6), 1691–1695 (2007)MathSciNetCrossRef
8.
Zurück zum Zitat Chetan, K., Nirmala, S.: An efficient and secure robust watermarking scheme for document images using integer wavelets and block coding of binary watermarks. Trans. Inf. Security Appl. 24, 13–24 (2015) Chetan, K., Nirmala, S.: An efficient and secure robust watermarking scheme for document images using integer wavelets and block coding of binary watermarks. Trans. Inf. Security Appl. 24, 13–24 (2015)
9.
Zurück zum Zitat Cu, V.L., Burie, J.C., Ogier, J.M.: Document images watermarking for security issue using fully convolutional networks. In: International Conference on Pattern Recognition (2018) Cu, V.L., Burie, J.C., Ogier, J.M.: Document images watermarking for security issue using fully convolutional networks. In: International Conference on Pattern Recognition (2018)
10.
Zurück zum Zitat Cu, V.L., Burie, J.C., Ogier, J.M.: Stable regions and object fill-based approach for document images watermarking. In: 13th IAPR International Workshop on Document Analysis Systems (2018) Cu, V.L., Burie, J.C., Ogier, J.M.: Stable regions and object fill-based approach for document images watermarking. In: 13th IAPR International Workshop on Document Analysis Systems (2018)
11.
Zurück zum Zitat Cunha, A.L.D., Zhou, J., Do, M.N.: The nonsubsampled contourlet transform: Theory, design, and applications. IEEE Trans. Image Process. 15(10), 3089–3101 (2006)CrossRef Cunha, A.L.D., Zhou, J., Do, M.N.: The nonsubsampled contourlet transform: Theory, design, and applications. IEEE Trans. Image Process. 15(10), 3089–3101 (2006)CrossRef
12.
Zurück zum Zitat Daraee, F., Mozaffari, S.: Watermarking in binary document images using fractal codes. Pattern Recogn. Lett. 35(2014), 120–129 (2014)CrossRef Daraee, F., Mozaffari, S.: Watermarking in binary document images using fractal codes. Pattern Recogn. Lett. 35(2014), 120–129 (2014)CrossRef
13.
Zurück zum Zitat Hamid, A.S., Mansour, J.: Robust watermarking against print and scan attack through efficient modeling algorithm. Image Commun. 29(10), 1181–1196 (2014) Hamid, A.S., Mansour, J.: Robust watermarking against print and scan attack through efficient modeling algorithm. Image Commun. 29(10), 1181–1196 (2014)
14.
Zurück zum Zitat Haribabu, K., Subrahmanyam, G.R.K.S., Mishra, D.: A robust digital image watermarking technique using auto encoder based convolutional neural networks. In: WCI (2015) Haribabu, K., Subrahmanyam, G.R.K.S., Mishra, D.: A robust digital image watermarking technique using auto encoder based convolutional neural networks. In: WCI (2015)
15.
Zurück zum Zitat Hieu, V., Dang, W., Kinsner, Y.W.: Multiobjective image data hiding based on neural networks and memetic optimization. WSEAS Trans. Signal Process. 10, 645–661 (2014) Hieu, V., Dang, W., Kinsner, Y.W.: Multiobjective image data hiding based on neural networks and memetic optimization. WSEAS Trans. Signal Process. 10, 645–661 (2014)
16.
Zurück zum Zitat Hou, Q., Junping, D., Li, L., Lu, J., Chang, C.C.: Scanned binary image watermarking based on additive model and sampling. Multimedia Tools Appl. 74(21), 9407–9426 (2015)CrossRef Hou, Q., Junping, D., Li, L., Lu, J., Chang, C.C.: Scanned binary image watermarking based on additive model and sampling. Multimedia Tools Appl. 74(21), 9407–9426 (2015)CrossRef
17.
Zurück zum Zitat Hu, S.: Document image watermarking based on weight-invariant partition using support vector machine. In: DAS VI (2004) Hu, S.: Document image watermarking based on weight-invariant partition using support vector machine. In: DAS VI (2004)
18.
Zurück zum Zitat Jamali, M., Rafiee, S., Soroushmehr, S.M.R., Karimi, N., Shirani, S., Najarian, K., Samavi, S.: Adaptive blind image watermarking using fuzzy inference system based on human visual perception. CoRR (2017) Jamali, M., Rafiee, S., Soroushmehr, S.M.R., Karimi, N., Shirani, S., Najarian, K., Samavi, S.: Adaptive blind image watermarking using fuzzy inference system based on human visual perception. CoRR (2017)
19.
Zurück zum Zitat Jinn, H.S., Didi, R., Pingzhi, F., Xian, W., Khurram, K.M.: An adaptive watermarking scheme for e-government document images. Multimedia Tools Appl. 72(3), 3085–3103 (2014)CrossRef Jinn, H.S., Didi, R., Pingzhi, F., Xian, W., Khurram, K.M.: An adaptive watermarking scheme for e-government document images. Multimedia Tools Appl. 72(3), 3085–3103 (2014)CrossRef
20.
Zurück zum Zitat Jung, K.H., Kee-Young, Y.: Data hiding method in binary images based on block masking for key authentication. Inf. Sci. 277, 188–196 (2014)CrossRef Jung, K.H., Kee-Young, Y.: Data hiding method in binary images based on block masking for key authentication. Inf. Sci. 277, 188–196 (2014)CrossRef
21.
Zurück zum Zitat Kim, Y.W., Moon, K., Oh, I.S.: A text watermarking algorithm based on word classification and inter-word space statistics. In: ICDAR ’03 (2003) Kim, Y.W., Moon, K., Oh, I.S.: A text watermarking algorithm based on word classification and inter-word space statistics. In: ICDAR ’03 (2003)
22.
Zurück zum Zitat Kim, Y.W., Seok, O.: Watermarking text document images using edge direction histograms. Pattern Recogn. Lett. 25(11), 1243–1251 (2004)CrossRef Kim, Y.W., Seok, O.: Watermarking text document images using edge direction histograms. Pattern Recogn. Lett. 25(11), 1243–1251 (2004)CrossRef
23.
Zurück zum Zitat Lee, Y., Kim, H., Park, Y.: A new data hiding scheme for binary image authentication with small image distortion. Inf. Sci. 179(22), 3866–3884 (2009)CrossRef Lee, Y., Kim, H., Park, Y.: A new data hiding scheme for binary image authentication with small image distortion. Inf. Sci. 179(22), 3866–3884 (2009)CrossRef
25.
Zurück zum Zitat Lu, H., Shi, X., Shi, Y.Q., Kot, A.C., Chen, L.: Watermark embedding in DC components of DCT for binary images. In: MMSP (2002) Lu, H., Shi, X., Shi, Y.Q., Kot, A.C., Chen, L.: Watermark embedding in DC components of DCT for binary images. In: MMSP (2002)
26.
Zurück zum Zitat Munib, S., Khan, A.: Robust image watermarking technique using triangular regions and zernike moments for quantization based embedding. Multimed. Tools Appl. 76(6), 8695–8710 (2017)CrossRef Munib, S., Khan, A.: Robust image watermarking technique using triangular regions and zernike moments for quantization based embedding. Multimed. Tools Appl. 76(6), 8695–8710 (2017)CrossRef
27.
Zurück zum Zitat Matas, J., Chum, O., Urban, M., Pajdla, T.: Robust wide baseline stereo from maximally stable extremal regions. Image Vision Comput. 22(10), 761–767 (2002)CrossRef Matas, J., Chum, O., Urban, M., Pajdla, T.: Robust wide baseline stereo from maximally stable extremal regions. Image Vision Comput. 22(10), 761–767 (2002)CrossRef
28.
Zurück zum Zitat Mun, S.M., Nam, S.H., Jang, H.U., K., D., Lee, H.K.: A robust blind watermarking using convolutional neural network. CoRR (2017) Mun, S.M., Nam, S.H., Jang, H.U., K., D., Lee, H.K.: A robust blind watermarking using convolutional neural network. CoRR (2017)
29.
Zurück zum Zitat Nguyen, T.S., Chang, C.C., Hsueh, H.S.: High capacity data hiding for binary image based on block classification. Multimed. Tools Appl. 75(14), 8513–8526 (2016)CrossRef Nguyen, T.S., Chang, C.C., Hsueh, H.S.: High capacity data hiding for binary image based on block classification. Multimed. Tools Appl. 75(14), 8513–8526 (2016)CrossRef
30.
Zurück zum Zitat Palit, S., Garain, U.: A novel technique for the watermarking of symbolically compressed documents. In: DIAL’06, vol. 2006 (2006) Palit, S., Garain, U.: A novel technique for the watermarking of symbolically compressed documents. In: DIAL’06, vol. 2006 (2006)
31.
Zurück zum Zitat Shelhamer, E., Long, J., Darrell, T.: Fully convolutional networks for semantic segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 39(4), 640–651 (2017)CrossRef Shelhamer, E., Long, J., Darrell, T.: Fully convolutional networks for semantic segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 39(4), 640–651 (2017)CrossRef
32.
Zurück zum Zitat Shih, F.Y.: Digital Watermarking and Steganography: Fundamentals and Techniques, 2 edn (2017) Shih, F.Y.: Digital Watermarking and Steganography: Fundamentals and Techniques, 2 edn (2017)
33.
Zurück zum Zitat Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. CoRR (2014) Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. CoRR (2014)
34.
Zurück zum Zitat Tan, L., Sun, X., Sun, G.: Print-scan resilient text image watermarking based on stroke direction modulation for chinese document authentication. Radioengineering (2012) Tan, L., Sun, X., Sun, G.: Print-scan resilient text image watermarking based on stroke direction modulation for chinese document authentication. Radioengineering (2012)
35.
Zurück zum Zitat Varna, A.L., Rane, S., Vetro, A.: Data hiding in hard-copy text documents robust to print, scan and photocopy operations. In: International Conference on Acoustics, Speech and Signal Processing (2009) Varna, A.L., Rane, S., Vetro, A.: Data hiding in hard-copy text documents robust to print, scan and photocopy operations. In: International Conference on Acoustics, Speech and Signal Processing (2009)
36.
Zurück zum Zitat Wang, C., Chang, Y., Chang, C., Jan, J., Lin, C.: A high capacity data hiding scheme for binary images based on block patterns. J. Syst. Softw. 93(2014), 152–162 (2014)CrossRef Wang, C., Chang, Y., Chang, C., Jan, J., Lin, C.: A high capacity data hiding scheme for binary images based on block patterns. J. Syst. Softw. 93(2014), 152–162 (2014)CrossRef
37.
Zurück zum Zitat Xiao, C., Zhang, C., Zheng, C.: Fontcode: embedding information in text documents using glyph perturbation. ACM Trans. Graph 37(2), 1–16 (2018)CrossRef Xiao, C., Zhang, C., Zheng, C.: Fontcode: embedding information in text documents using glyph perturbation. ACM Trans. Graph 37(2), 1–16 (2018)CrossRef
38.
Zurück zum Zitat Yang, H., Kot, A.C.: Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans. Multimed. 9(3), 475–486 (2007)CrossRef Yang, H., Kot, A.C.: Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans. Multimed. 9(3), 475–486 (2007)CrossRef
39.
Zurück zum Zitat Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)CrossRef Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)CrossRef
40.
Zurück zum Zitat Zeng, X.T., Ping, L.D., Pan, X.Z.: A lossless robust data hiding scheme. Pattern Recogn. 43(4), 1656–1667 (2010)MATHCrossRef Zeng, X.T., Ping, L.D., Pan, X.Z.: A lossless robust data hiding scheme. Pattern Recogn. 43(4), 1656–1667 (2010)MATHCrossRef
41.
Zurück zum Zitat Zolotavkin, Y., Juhola, M.: A new two-dimensional quantization method for digital image watermarking. In: ICACT (2015) Zolotavkin, Y., Juhola, M.: A new two-dimensional quantization method for digital image watermarking. In: ICACT (2015)
42.
Zurück zum Zitat Zou, D., Shi, Y.Q.: Formatted text document data hiding robust to printing, copying and scanning. In: ISCAS (2005) Zou, D., Shi, Y.Q.: Formatted text document data hiding robust to printing, copying and scanning. In: ISCAS (2005)
Metadaten
Titel
A robust watermarking approach for security issue of binary documents using fully convolutional networks
verfasst von
Vinh Loc Cu
Trac Nguyen
Jean-Christophe Burie
Jean-Marc Ogier
Publikationsdatum
11.08.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal on Document Analysis and Recognition (IJDAR) / Ausgabe 3/2020
Print ISSN: 1433-2833
Elektronische ISSN: 1433-2825
DOI
https://doi.org/10.1007/s10032-020-00355-z