2006
DOI: 10.1142/s0218001406004818
|View full text |Cite
|
Sign up to set email alerts
|

Fast Watermark Detection Scheme From Camera-Captured Images on Mobile Phones

Abstract: An improved scheme for integrity protection of binary images representing text documents based on the topologies of these images is proposed. The image skeleton and the inverse skeleton are found through thinning and the skeleton signature is combined with watermark information. The result is encrypted asymmetrically and hidden in embeddable locations of the image. A series of attack experiments are conducted to demonstrate that the approach is capable of detecting tampering. Even single malicious pixel modifi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2007
2007
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…A more recent generation of visual markers, which can be more easily read by low cost imaging cameras has been presented over the last twenty years. Proposed applications include mixed reality systems [19,14], video post-production [24,13] and, more recently, human-computer interfaces for camera-phones [16,17,21]. Because most systems rely on geometrical feature detection both to localise the markers within input images and for encoding unique identifiers in each marker, the markers' visual appearance is strongly constrained.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A more recent generation of visual markers, which can be more easily read by low cost imaging cameras has been presented over the last twenty years. Proposed applications include mixed reality systems [19,14], video post-production [24,13] and, more recently, human-computer interfaces for camera-phones [16,17,21]. Because most systems rely on geometrical feature detection both to localise the markers within input images and for encoding unique identifiers in each marker, the markers' visual appearance is strongly constrained.…”
Section: Related Workmentioning
confidence: 99%
“…Fast watermark detection [17] can be an alternative approach to visual marker recognition. This technique encodes information such as an identifier over any 2D image, invisibly.…”
Section: Related Workmentioning
confidence: 99%
“…E ((') is amplified by the embedding intensity parameter a, an added to the temporal Fourier coefficient vz-) with cycle T of averaged pixel value in the corresponding block as -Jf(n) =a(n) + a$(n) (n = 1... N). (1) ach d is the This addition can be expressed as follows: temporal sine wave signals with the initial phase arg ($(), amplitude aKI() l, and cycle T, are generated and arranged as a 2-D array. For a frame of the input video at time t, the temporal cross-section at time t of the array above is superposed as block patterns in the frame (Figure 2).…”
Section: Watermark Embeddingmentioning
confidence: 99%
“…Analog images along with embedded content IDs as invisible watermarks are captured by mobile phone cameras. The content IDs are detected in captured images and used to link to digital information services [1]. Conventional reference services for mobile phones are designed for still images and detect watermarks from single pictures.…”
Section: Introductionmentioning
confidence: 99%
“…An ID message receiving technology with a mobile phone camera for image content on printed materials or electronic display devices, adding a QR-code pattern or embedding a digital watermark, has also been put into practical use [2]. An identification technology called the "fingerprint method," without modifying the image content itself, based on image pattern matching, with reference to previously constructed image feature pattern databases, has also been used.…”
Section: Introductionmentioning
confidence: 99%