4/2016 - 4 |
Robust Fourier Watermarking for ID Images on Smart Card Plastic SupportsRIAD, R. , HARBA, R. , DOUZI, H. , ROS, F. , ELHAJJI, M. |
Extra paper information in |
Click to see author's profile in SCOPUS, IEEE Xplore, Web of Science |
Download PDF (1,691 KB) | Citation | Downloads: 1,024 | Views: 3,325 |
Author keywords
Fourier transform, printing, scanning, smart cards, watermarking
References keywords
image(21), watermarking(19), processing(14), signal(8), robust(7), multimedia(7), print(6), scan(5), watermark(4), images(4)
Blue keywords are present in both the references section and the paper title.
About this article
Date of Publication: 2016-11-30
Volume 16, Issue 4, Year 2016, On page(s): 23 - 30
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2016.04004
Web of Science Accession Number: 000390675900004
SCOPUS ID: 85007608255
Abstract
Security checking can be improved by watermarking identity (ID) images printed on smart cards plastic supports. The major challenge is resistance to attacks: printing the images on the plastic cards, durability and other attacks then scanning the image from the plastic card. In this work, a robust watermarking technique is presented in this context. It is composed of three main mechanisms. The first is a watermarking algorithm based on the Fourier transform to cope with global geometric distortions. The second comprises a filter that reduces image blurring. The third attenuates color degradations. Experiments on 400 ID images show that the Wiener filter strongly improves the detection rate and outperforms competitive algorithms (blind deconvolution and unsharp filter). Color corrections also enhance the watermarking score. The whole scheme has a high efficiency and a low computational cost. It makes it compatible with the desired industrial constraints, i.e. the watermark is to be invisible, the error rate must be lower than 1%, and the detection of the mark should be fast and simple for the user. |
References | | | Cited By «-- Click to see who has cited this paper |
[1] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital watermarking and steganography: Morgan Kaufmann, 2007.
[2] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM systems journal, vol. 35, pp. 313-336, 1996. [CrossRef] [Web of Science Times Cited 1388] [SCOPUS Times Cited 2246] [3] A. Poljicak, G. Botella, C. Garcia, L. Kedmenec, and M. Prieto-Matias, "Portable real-time DCT-based steganography using OpenCL," Journal of Real-Time Image Processing, pp. 1-13, 2016. [CrossRef] [Web of Science Times Cited 9] [SCOPUS Times Cited 13] [4] V. Solachidis and I. Pitas, "Circularly symmetric watermark embedding in 2-D DFT domain," IEEE Transactions on Image Processing, vol. 10, pp. 1741-1753, 2001. [CrossRef] [Web of Science Times Cited 197] [SCOPUS Times Cited 245] [5] S. H. Amiri and M. Jamzad, "Robust watermarking against print and scan attack through efficient modeling algorithm," Signal Processing: Image Communication, vol. 29, pp. 1181-1196, 2014. [CrossRef] [Web of Science Times Cited 17] [SCOPUS Times Cited 22] [6] P. Bas, J.-M. Chassery, and B. Macq, "Image watermarking: an evolution to content based approaches," Pattern recognition, vol. 35, pp. 545-561, 2002. [CrossRef] [Web of Science Times Cited 29] [SCOPUS Times Cited 39] [7] H. S. Malvar and D. A. Florêncio, "Improved spread spectrum: a new modulation technique for robust watermarking," IEEE Transactions on Signal Processing, vol. 51, pp. 898-905, 2003. [CrossRef] [Web of Science Times Cited 336] [SCOPUS Times Cited 425] [8] W. Wan, J. Liu, J. Sun, C. Ge and X. Nie, "Logarithmic STDM watermarking using visual saliency-based JND model," in Electronics Letters, vol. 51, no. 10, pp. 758-760, 5 14 2015. [CrossRef] [Web of Science Times Cited 14] [SCOPUS Times Cited 16] [9] T. Bianchi and A. Piva, "Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues," in IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 87-96, 2013. [CrossRef] [Web of Science Times Cited 99] [SCOPUS Times Cited 121] [10] F. Ros, J. Borla, F. Leclerc, R. Harba, and N. Launay, "An industrial watermarking process for plastic card supports," ICIT 2006. IEEE International Conference on Industrial Technology, 2006, pp. 2809-2814. [CrossRef] [SCOPUS Times Cited 7] [11] J. F. Lichtenauer, I. Setyawan, T. Kalker, and R. L. Lagendijk, "Exhaustive geometrical search and the false positive watermark detection probability," Proc. SPIE 5020, Security and Watermarking of Multimedia Contents V, p. 203, 2003. [CrossRef] [Web of Science Times Cited 35] [SCOPUS Times Cited 57] [12] S. Pereira and T. Pun, "Robust template matching for affine resistant image watermarks," IEEE Transactions on Image Processing, vol. 9, pp. 1123-1129, 2000. [CrossRef] [Web of Science Times Cited 357] [SCOPUS Times Cited 485] [13] A. Poljicak, L. Mandic, and D. Agic, "Discrete Fourier transform-based watermarking method with an optimal implementation radius," Journal of Electronic Imaging, vol. 20, pp. 033008-033008-8, 2011. [CrossRef] [Web of Science Times Cited 76] [SCOPUS Times Cited 110] [14] A. Poljicak, L. Mandic, and M. S. Kurecic, "Improvement of the watermark detector performance using image enhancement filters," in Systems, Signals and Image Processing (IWSSIP), 2012 19th International Conference on, 2012, pp. 68-71. [15] L. Yu, X. Niu, and S. Sun, "Print-and-scan model and the watermarking countermeasure," Image and Vision Computing, vol. 23, pp. 807-814, 2005. [CrossRef] [Web of Science Times Cited 37] [SCOPUS Times Cited 58] [16] R. Riad, R. Harba, H. Douzi, M. El-hajji, and F. Ros, "Print-and-scan counterattacks for plastic card supports Fourier watermarking," in IEEE 23rd International Symposium on Industrial Electronics (ISIE), pp. 1036-1041, 2014. [CrossRef] [SCOPUS Times Cited 9] [17] A. Keskinarkaus, A. Pramila, T. Seppänen, "Image watermarking with feature point based synchronization robust to print-scan attack," Journal of Visual Communication and Image Representation, vol. 23, no. 3, pp. 507-515, 2012. [CrossRef] [Web of Science Times Cited 17] [SCOPUS Times Cited 22] [18] X.-Y. Wang, Y.-N. Liu, S. Li, H.-Y. Yang and P.-P. Niu, "Robust image watermarking approach using polar harmonic transforms based geometric correction," Neurocomputing, vol. 174, Part B, pp. 627-642, 2016. [CrossRef] [Web of Science Times Cited 40] [SCOPUS Times Cited 53] [19] H.-Y. Yang, X.-Y. Wang, P.-P. Niu, and A.-L. Wang, "Robust Color Image Watermarking Using Geometric Invariant Quaternion Polar Harmonic Transform," ACM Trans. Multimedia Comput. Commun. Appl., vol. 11, pp. 1-26, 2015. [CrossRef] [Web of Science Times Cited 45] [SCOPUS Times Cited 51] [20] Z. Shao, Y. Shang, Y. Zhang, X. Liu, and G. Guo, "Robust watermarking using orthogonal Fourier-Mellin moments and chaotic map for double images," Signal Processing, vol. 120, pp. 522-531, 2016. [CrossRef] [Web of Science Times Cited 89] [SCOPUS Times Cited 105] [21] M. Ali and C. W. Ahn, "An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain," Signal Processing, vol. 94, pp. 545-556, 2014. [CrossRef] [Web of Science Times Cited 134] [SCOPUS Times Cited 160] [22] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, "Digital image steganography: Survey and analysis of current methods," Signal processing, vol. 90, pp. 727-752, 2010. [CrossRef] [Web of Science Times Cited 889] [SCOPUS Times Cited 1329] [23] C. Strauss, F. Pasteau, F. Autrusseau, M. Babel, L. Bedat, and O. Deforges, "Subjective and objective quality evaluation of lar coded art images," IEEE International Conference on in Multimedia and Expo ICME 2009, pp. 674-677, 2009. [CrossRef] [SCOPUS Times Cited 13] [24] M. Carnec, P. Le Callet, and D. Barba, "Objective quality assessment of color images based on a generic perceptual reduced reference," Signal Processing: Image Communication, vol. 23, pp. 239-256, 2008. [CrossRef] [Web of Science Times Cited 85] [SCOPUS Times Cited 106] [25] P. Le Callet, F. Autrusseau, and P. Campisi, "Visibility control and quality assessment of watermarking and data hiding algorithms," Multimedia Forensics and security, pp. 163-192, 2008. [CrossRef] [SCOPUS Record] [26] M. L. Miller and J. A. Bloom, "Computing the probability of false watermark detection," in Information Hiding, pp. 146-158, 1999. [CrossRef] [SCOPUS Times Cited 58] [27] C.-Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, "Rotation, scale, and translation resilient watermarking for images," IEEE Transactions on Image Processing, vol. 10, pp. 767-782, 2001. [CrossRef] [Web of Science Times Cited 463] [SCOPUS Times Cited 616] [28] C.-Y. Lin and S.-F. Chang, "Distortion modeling and invariant extraction for digital image print-and-scan process," in Proceedings of International Symposium on Multimedia, 1999. [29] A. Malvido, F. Perez-González, and A. Cousiño, "A novel model for the print-and-capture channel in 2D bar codes," in Multimedia Content Representation, Classification and Security, ed: Springer, 2006, pp. 627-634. [CrossRef] [SCOPUS Times Cited 10] [30] R. Riad, M. El Hajji, H. Douzi, R. Harba, and F. Ros, "Evaluation of a Fourier Watermarking Method Robustness to Cards Durability Attacks," in Image and Signal Processing, ed: Springer, 2014, pp. 280-288. [CrossRef] [SCOPUS Times Cited 2] [31] Z. Sharif and A. Z. Sha'Ameri, "The application of cross correlation technique for estimating impulse response and frequency response of wireless communication channel,", SCOReD 2007. in 5th Student Conference on Research and Development, 2007, pp. 1-5. [CrossRef] [SCOPUS Times Cited 14] [32] F. Luisier, T. Blu, and M. Unser, "Image denoising in mixed Poisson-Gaussian noise," IEEE Transactions on Image Processing, vol. 20, pp. 696-708, 2011. [CrossRef] [Web of Science Times Cited 311] [SCOPUS Times Cited 368] [33] C. Liu, R. Szeliski, S. B. Kang, C. L. Zitnick, and W. T. Freeman, "Automatic estimation and removal of noise from a single image," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 30, pp. 299-314, 2008. [CrossRef] [Web of Science Times Cited 348] [SCOPUS Times Cited 420] Web of Science® Citations for all references: 5,015 TCR SCOPUS® Citations for all references: 7,180 TCR Web of Science® Average Citations per reference: 148 ACR SCOPUS® Average Citations per reference: 211 ACR TCR = Total Citations for References / ACR = Average Citations per Reference We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more Citations for references updated on 2024-11-10 19:08 in 204 seconds. Note1: Web of Science® is a registered trademark of Clarivate Analytics. Note2: SCOPUS® is a registered trademark of Elsevier B.V. Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site. |
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania
All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.
Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.
Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.