Skip to main content
Top

2016 | OriginalPaper | Chapter

Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes

Authors : Takeru Maehara, Ryo Ikeda, Satoshi Ono

Published in: Digital-Forensics and Watermarking

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Two-dimensional barcodes (2D codes) have become common as an authentification way of e-tickets and e-coupons. However, easy replication by using other mobile phone camera is apprehended. This paper proposes a method for detecting copied 2D code by a semi-fragile digital video watermark which can be destroyed by replication. Compared to digital image watermarking, it is more difficult to copy 2D code in which the time-varying watermark is embedded without destroying the watermark. In the proposed method, the video watermarking scheme is optimized to maximize the difference of the watermark extraction degree between valid and replicated 2D code videos. The optimization is performed using a novel self-adaptive differential evolution algorithm with actual mobile devices rather than simulation. Experimental results have shown that the proposed method successfully designs a video watermarking scheme which allows authenticity determination of 2D codes displayed on mobile device screen.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Values of m and n were determined by referring to JPEG compression.
 
Literature
1.
go back to reference Anqiang, L., Jing, L.: A novel scheme for robust video watermark in the 3D-DWT domain. In: 2007 The First International Symposium on Data, Privacy, and E-Commerce, ISDPE 2007, pp. 514–516. IEEE (2007) Anqiang, L., Jing, L.: A novel scheme for robust video watermark in the 3D-DWT domain. In: 2007 The First International Symposium on Data, Privacy, and E-Commerce, ISDPE 2007, pp. 514–516. IEEE (2007)
2.
go back to reference Chen, A.H.L., Chyu, C.C.: A memetic algorithm for maximizing net present value in resource-constrained project scheduling problem. In: Proceedings of IEEE World Congress on Computational Intelligence, pp. 2401–2408 (2008) Chen, A.H.L., Chyu, C.C.: A memetic algorithm for maximizing net present value in resource-constrained project scheduling problem. In: Proceedings of IEEE World Congress on Computational Intelligence, pp. 2401–2408 (2008)
3.
go back to reference Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)MathSciNetCrossRefMATH Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)MathSciNetCrossRefMATH
5.
go back to reference Das, S., Suganthan, P.N.: Differential evolution: a survey of the state-of-the-art. IEEE Trans. Evol. Comput. 15(1), 4–31 (2011)CrossRef Das, S., Suganthan, P.N.: Differential evolution: a survey of the state-of-the-art. IEEE Trans. Evol. Comput. 15(1), 4–31 (2011)CrossRef
7.
go back to reference Huang, H.Y., Yang, C.H., Hsu, W.H.: A video watermarking algorithm based on pseudo 3D DCT. In: 2009 IEEE Symposium on Computational Intelligence for Image Processing, CIIP 2009, pp. 76–81. IEEE (2009) Huang, H.Y., Yang, C.H., Hsu, W.H.: A video watermarking algorithm based on pseudo 3D DCT. In: 2009 IEEE Symposium on Computational Intelligence for Image Processing, CIIP 2009, pp. 76–81. IEEE (2009)
8.
go back to reference Maehara, T., Nakai, K., Ikeda, R., Taniguchi, K., Ono, S.: Watermark design of two-dimensional barcodes on mobile phone display by evolutionary multi-objective optimization. In: Proceedings of Joint 7th International Conference on Soft Computing and Intelligent Systems and 15th International Symposium on Advanced Intelligent Systems, pp. 149–154 (2014) Maehara, T., Nakai, K., Ikeda, R., Taniguchi, K., Ono, S.: Watermark design of two-dimensional barcodes on mobile phone display by evolutionary multi-objective optimization. In: Proceedings of Joint 7th International Conference on Soft Computing and Intelligent Systems and 15th International Symposium on Advanced Intelligent Systems, pp. 149–154 (2014)
10.
go back to reference Nakamura, H., Gohshi, S., Fujii, R., Ito, H., Suzuki, M., Takai, S., Tani, Y.: A digital watermark that survives after re-shooting the images displayed on a CRT screen. J. Inst. Image Inf. Telev. Eng. 60(11), 1778–1788 (2006) Nakamura, H., Gohshi, S., Fujii, R., Ito, H., Suzuki, M., Takai, S., Tani, Y.: A digital watermark that survives after re-shooting the images displayed on a CRT screen. J. Inst. Image Inf. Telev. Eng. 60(11), 1778–1788 (2006)
11.
go back to reference Ono, S., Maehara, T., Nakai, K., Ikeda, R., Taniguchi, K.: Semi-fragile watermark design for detecting illegal two-dimensional barcodes by evolutionary multi-objective optimization. In: Proceedings of Genetic and Evolutionary Computation Conference (GECCO) (Companion), pp. 175–176 (2014) Ono, S., Maehara, T., Nakai, K., Ikeda, R., Taniguchi, K.: Semi-fragile watermark design for detecting illegal two-dimensional barcodes by evolutionary multi-objective optimization. In: Proceedings of Genetic and Evolutionary Computation Conference (GECCO) (Companion), pp. 175–176 (2014)
14.
go back to reference Tanabe, R., Fukunaga, A.: Success-history based parameter adaptation for differential evolution. In: 2013 IEEE Congress on Evolutionary Computation (CEC), pp. 71–78, June 2013 Tanabe, R., Fukunaga, A.: Success-history based parameter adaptation for differential evolution. In: 2013 IEEE Congress on Evolutionary Computation (CEC), pp. 71–78, June 2013
15.
go back to reference Thiemert, S., Sahbi, H., Steinebach, M.: Using entropy for image and video authentication watermarks. In: Proceedings of the SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII. No. 607218 (2006). http://dx.org/10.1117/12.643053 Thiemert, S., Sahbi, H., Steinebach, M.: Using entropy for image and video authentication watermarks. In: Proceedings of the SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII. No. 607218 (2006). http://​dx.​org/​10.​1117/​12.​643053
16.
go back to reference Zhang, J., Sanderson, A.: JADE: adaptive differential evolution with optional external archive. IEEE Trans. Evol. Comput. 13(5), 945–958 (2009)CrossRef Zhang, J., Sanderson, A.: JADE: adaptive differential evolution with optional external archive. IEEE Trans. Evol. Comput. 13(5), 945–958 (2009)CrossRef
Metadata
Title
Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes
Authors
Takeru Maehara
Ryo Ikeda
Satoshi Ono
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-31960-5_16

Premium Partner