Abstract
Watermarking is a suitable approach for digital image authentication. Robustness regarding attacks that aim to remove the watermark is one of the most important challenges in watermarking, in general. Several different attacks are reported that aim to make it difficult or impossible for the real owner of the digital watermarked image to extract the watermark. Some of such common attacks are noise addition, compression, scaling, rotation, clipping, cropping, etc. In this paper we address the issue of print and scan attack by introducing a method to model the scanner and printer. Then we will simulate the print and scan attack on the digital images to evaluate its robustness. In addition, we introduce how to identify the system and how to analyze the noise imposed on the digital image when it is printed and the printed version is scanned. In this approach we obtained high flexibility in analyzing the behavior of different printers and scanners. By examining the amount of degradation applied on the original watermarked image obtained after the process of scanning its printed version, we can embed the watermark in such a way that the robustness of watermark is maintained by print and scan attack. To evaluate the performance of the proposed method we used some bench marks that are available for this purpose. Our experimental results showed a high performance for our method in modeling the print and scan operations.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Howarth, P., Ruger, S.: Evaluation of Texture Features for Content-Based Image Retrieval. In: Enser, P.G.B., Kompatsiaris, Y., O’Connor, N.E., Smeaton, A., Smeulders, A.W.M. (eds.) CIVR 2004. LNCS, vol. 3115, pp. 326–334. Springer, Heidelberg (2004)
Hyvarinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. John Wiley & Sons, New York (2001)
Kacker, D., Camis, T., Allebach, J.P.: Electrophotographic process embedded in direct binary search. IEEE Transactions on Image Processing 11, 243–257 (2002)
Lin, C., Chang, S.: Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process. In: International Symposium on Multimedia Information Processing, Taipei (1999)
Manjunath, B.S., Ma, W.Y.: Texture features for browsing and retrieval of image data. IEEE Transaction on Pattern Analysis and Machine Intelligence 18, 837–842 (1996)
Solanki, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Modeling the print-scan process for resilient data hiding. In: Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents VII, pp. 418–429 (2005)
Suykens, J., Vandewalle, J., de Moor, B.: Artificial Neural Networks for Modeling and Control of Non-linear Systems. Kluwer Academic Publishers, Netherlands (1996)
Yaghmaee, F., Jamzad, M.: Computing watermark capacity in images according to their quad tree. In: 5th IEEE International Symposium on Signal Processing and Information Technology, pp. 823–826. IEEE Press, Los Alamitos (2005)
Yu, L., Niu, X., Sun, S.: Print-and-scan model and the watermarking countermeasure. In: Image and Vision Computing, pp. 807–814. Elsevier, Amsterdam (2005)
Chen, P., Zhao, Y., Pan, J.: Image Watermarking Robust to Print and Generation Copy. In: First International Conference on Innovative Computing, Information and Control, pp. 496–500. IEEE Press, Los Alamitos (2006)
Song, Y.J., Liu, R.Z., Tan, T.N.: Digital Watermarking for Forgery Detection in Printed Materials. In: Shum, H.-Y., Liao, M., Chang, S.-F. (eds.) PCM 2001. LNCS, vol. 2195, pp. 403–410. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Amiri, S.H., Jamzad, M. (2009). An Algorithm for Modeling Print and Scan Operations Used for Watermarking. In: Kim, HJ., Katzenbeisser, S., Ho, A.T.S. (eds) Digital Watermarking. IWDW 2008. Lecture Notes in Computer Science, vol 5450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04438-0_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-04438-0_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04437-3
Online ISBN: 978-3-642-04438-0
eBook Packages: Computer ScienceComputer Science (R0)