Skip to main content
Top

2014 | OriginalPaper | Chapter

Research on Graphic Digital Text Watermarking Research Framework

Authors : Jin Zhang, Xiaowei Liu, Xiaoli Gong, Rui Lu, Zhenlu Chen

Published in: Advanced Technologies, Embedded and Multimedia for Human-centric Computing

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper proposes a research framework for graphic digital text Watermarking algorithms and methods. We summarized graphic text watermarking after a brief review of digital text watermarking, and propose the research framework which consists of 8 levels, pixel, line, etymon, character, row, paragraph, page, and chapter. And we give the details of pixel level details and review most graphic text watermarking of this level as the example. At last we also figure out distribution of nowadays algorithms and discuss further research’s possibility.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Brassil JT, Low S, Maxemchuk NF (1999) Copyright protection for the electronic distribution of text documents. In: Proceedings of the IEEE. 87, IEEE Press, New York, pp 1181–1196 Brassil JT, Low S, Maxemchuk NF (1999) Copyright protection for the electronic distribution of text documents. In: Proceedings of the IEEE. 87, IEEE Press, New York, pp 1181–1196
2.
go back to reference Cox I, Miller M, Bloom J et al (2007) Digital watermarking and steganography. Morgan Kaufmann Publishers In; 2nd revised edition Cox I, Miller M, Bloom J et al (2007) Digital watermarking and steganography. Morgan Kaufmann Publishers In; 2nd revised edition
3.
go back to reference Maxemchuk NF (1994) Electronic document distribution. AT&T Tech J 6:73–80 Maxemchuk NF (1994) Electronic document distribution. AT&T Tech J 6:73–80
4.
go back to reference Kim Y, Oh I (2004) Watermarking text document images using edge direction histograms. Pattern Recogn Lett 11:25MathSciNet Kim Y, Oh I (2004) Watermarking text document images using edge direction histograms. Pattern Recogn Lett 11:25MathSciNet
5.
go back to reference Shirali-Shahreza MH, Shirali-Shahreza M (2006) A new approach to persian/arabic text steganography, computer and information science. In: 5th IEEE/ACIS international conference, IEEE Press, New York, pp 310–315 Shirali-Shahreza MH, Shirali-Shahreza M (2006) A new approach to persian/arabic text steganography, computer and information science. In: 5th IEEE/ACIS international conference, IEEE Press, New York, pp 310–315
6.
go back to reference Topkara U, Topkara M, Atallah MJ (2006) The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. In: ACM multimedia and security conference, ACM Press, New York, Geneva Topkara U, Topkara M, Atallah MJ (2006) The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. In: ACM multimedia and security conference, ACM Press, New York, Geneva
7.
go back to reference Wu M, Tang E, Liu B (2000) Data hiding in digital binary images. In: international conference on multimedia and expositions, IEEE Press, New York, pp 393–396 Wu M, Tang E, Liu B (2000) Data hiding in digital binary images. In: international conference on multimedia and expositions, IEEE Press, New York, pp 393–396
8.
go back to reference Wu M, Liu B (2004) Data hiding in binary image for authentication and annotation. Multimedia IEEE Trans 6(4):528–538CrossRef Wu M, Liu B (2004) Data hiding in binary image for authentication and annotation. Multimedia IEEE Trans 6(4):528–538CrossRef
9.
go back to reference Yang H, Kot AC, Liu J (2005) Semi-fragile watermarking for text document images authentication. In: 2005 IEEE international symposium on circuits and systems, vol 4, IEEE Press, New York, pp 4002–4005 Yang H, Kot AC, Liu J (2005) Semi-fragile watermarking for text document images authentication. In: 2005 IEEE international symposium on circuits and systems, vol 4, IEEE Press, New York, pp 4002–4005
10.
go back to reference Mei Q, Wong EK, Memon ND (2001) Data hiding in binary text documents. In: 2001 SPIE 4314, IEEE Press, New York, pp 369–375 Mei Q, Wong EK, Memon ND (2001) Data hiding in binary text documents. In: 2001 SPIE 4314, IEEE Press, New York, pp 369–375
11.
go back to reference Gou H, Wu M (2007) Improving embedding payload in binary images with “Super-Pixels”. In: 2007 IEEE international conference on image processing, vol 3, IEEE Press, New York, pp III-277–III-280 Gou H, Wu M (2007) Improving embedding payload in binary images with “Super-Pixels”. In: 2007 IEEE international conference on image processing, vol 3, IEEE Press, New York, pp III-277–III-280
12.
go back to reference Ho ATS, Puhan NB, Makur A, Marziliano P, Guan YL (2004) Imperceptible data embedding in sharply-contrasted binary images. In: 2004 international conference on control, automation, robotics and vision, vol 2, IEEE Press, New York Ho ATS, Puhan NB, Makur A, Marziliano P, Guan YL (2004) Imperceptible data embedding in sharply-contrasted binary images. In: 2004 international conference on control, automation, robotics and vision, vol 2, IEEE Press, New York
13.
go back to reference Khen TV, Makur A (2006) A word based self-embedding scheme for document watermark. In: TENCON 2006. 2006 IEEE region 10 conference, IEEE Press, New York, pp 1–4 Khen TV, Makur A (2006) A word based self-embedding scheme for document watermark. In: TENCON 2006. 2006 IEEE region 10 conference, IEEE Press, New York, pp 1–4
14.
go back to reference Varna AL, Rane S, Vetro A (2009) Data hiding in hard-copy text documents robust to print, scan and photocopy operations. In: 2009 IEEE international conference on acoustics, speech and signal processing, IEEE Press, New York, pp 1397–1400 Varna AL, Rane S, Vetro A (2009) Data hiding in hard-copy text documents robust to print, scan and photocopy operations. In: 2009 IEEE international conference on acoustics, speech and signal processing, IEEE Press, New York, pp 1397–1400
15.
go back to reference Tirandaz H, Davarzani R, Monemizadeh M, Haddadnia J (2009) Invisible and high capacity data hiding in binary text images based on use of edge pixels. In: 2009 international conference on signal processing systems, IEEE Press, New York, pp 130–134 Tirandaz H, Davarzani R, Monemizadeh M, Haddadnia J (2009) Invisible and high capacity data hiding in binary text images based on use of edge pixels. In: 2009 international conference on signal processing systems, IEEE Press, New York, pp 130–134
16.
go back to reference Yu X, Wang A (2009) Chain coding based data hiding in binary images. In: fifth international conference on intelligent information hiding and multimedia signal processing, IEEE Press, New York, pp 933–936 Yu X, Wang A (2009) Chain coding based data hiding in binary images. In: fifth international conference on intelligent information hiding and multimedia signal processing, IEEE Press, New York, pp 933–936
17.
go back to reference Zhang X, Liu F, Jiao L (2003) A new effective document water-marking technique based on outside edges. Syst Eng Electron 25(05):612–616 Zhang X, Liu F, Jiao L (2003) A new effective document water-marking technique based on outside edges. Syst Eng Electron 25(05):612–616
18.
go back to reference Zhang X, Liu F, Jiao L (2003) An effective document watermarking technique. J Commun 24(05):21–28 Zhang X, Liu F, Jiao L (2003) An effective document watermarking technique. J Commun 24(05):21–28
19.
go back to reference Zhao X, Sun J, Li L (2008) Watermarking of text images using character step edge adjustment. J Comput Appl 28(12):3175–3182MathSciNetMATH Zhao X, Sun J, Li L (2008) Watermarking of text images using character step edge adjustment. J Comput Appl 28(12):3175–3182MathSciNetMATH
20.
go back to reference Qi W, Li X, Yang B, Cheng D (2008) Document watermark scheme for information tracking. J Commun 29(10):183–190 Qi W, Li X, Yang B, Cheng D (2008) Document watermark scheme for information tracking. J Commun 29(10):183–190
21.
go back to reference Guo C, Xu G, Niu X, Li Y (2011) High-capacity text watermarking resistive to print-scan process. J Appl Sci 29(02):140–146 Guo C, Xu G, Niu X, Li Y (2011) High-capacity text watermarking resistive to print-scan process. J Appl Sci 29(02):140–146
Metadata
Title
Research on Graphic Digital Text Watermarking Research Framework
Authors
Jin Zhang
Xiaowei Liu
Xiaoli Gong
Rui Lu
Zhenlu Chen
Copyright Year
2014
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-7262-5_64