Skip to main content

An Algorithm for Modeling Print and Scan Operations Used for Watermarking

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5450))

Abstract

Watermarking is a suitable approach for digital image authentication. Robustness regarding attacks that aim to remove the watermark is one of the most important challenges in watermarking, in general. Several different attacks are reported that aim to make it difficult or impossible for the real owner of the digital watermarked image to extract the watermark. Some of such common attacks are noise addition, compression, scaling, rotation, clipping, cropping, etc. In this paper we address the issue of print and scan attack by introducing a method to model the scanner and printer. Then we will simulate the print and scan attack on the digital images to evaluate its robustness. In addition, we introduce how to identify the system and how to analyze the noise imposed on the digital image when it is printed and the printed version is scanned. In this approach we obtained high flexibility in analyzing the behavior of different printers and scanners. By examining the amount of degradation applied on the original watermarked image obtained after the process of scanning its printed version, we can embed the watermark in such a way that the robustness of watermark is maintained by print and scan attack. To evaluate the performance of the proposed method we used some bench marks that are available for this purpose. Our experimental results showed a high performance for our method in modeling the print and scan operations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Howarth, P., Ruger, S.: Evaluation of Texture Features for Content-Based Image Retrieval. In: Enser, P.G.B., Kompatsiaris, Y., O’Connor, N.E., Smeaton, A., Smeulders, A.W.M. (eds.) CIVR 2004. LNCS, vol. 3115, pp. 326–334. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Hyvarinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. John Wiley & Sons, New York (2001)

    Book  Google Scholar 

  3. Kacker, D., Camis, T., Allebach, J.P.: Electrophotographic process embedded in direct binary search. IEEE Transactions on Image Processing 11, 243–257 (2002)

    Article  Google Scholar 

  4. Lin, C., Chang, S.: Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process. In: International Symposium on Multimedia Information Processing, Taipei (1999)

    Google Scholar 

  5. Manjunath, B.S., Ma, W.Y.: Texture features for browsing and retrieval of image data. IEEE Transaction on Pattern Analysis and Machine Intelligence 18, 837–842 (1996)

    Article  Google Scholar 

  6. Solanki, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Modeling the print-scan process for resilient data hiding. In: Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents VII, pp. 418–429 (2005)

    Google Scholar 

  7. Suykens, J., Vandewalle, J., de Moor, B.: Artificial Neural Networks for Modeling and Control of Non-linear Systems. Kluwer Academic Publishers, Netherlands (1996)

    Book  Google Scholar 

  8. Yaghmaee, F., Jamzad, M.: Computing watermark capacity in images according to their quad tree. In: 5th IEEE International Symposium on Signal Processing and Information Technology, pp. 823–826. IEEE Press, Los Alamitos (2005)

    Google Scholar 

  9. Yu, L., Niu, X., Sun, S.: Print-and-scan model and the watermarking countermeasure. In: Image and Vision Computing, pp. 807–814. Elsevier, Amsterdam (2005)

    Google Scholar 

  10. Chen, P., Zhao, Y., Pan, J.: Image Watermarking Robust to Print and Generation Copy. In: First International Conference on Innovative Computing, Information and Control, pp. 496–500. IEEE Press, Los Alamitos (2006)

    Google Scholar 

  11. Song, Y.J., Liu, R.Z., Tan, T.N.: Digital Watermarking for Forgery Detection in Printed Materials. In: Shum, H.-Y., Liao, M., Chang, S.-F. (eds.) PCM 2001. LNCS, vol. 2195, pp. 403–410. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Amiri, S.H., Jamzad, M. (2009). An Algorithm for Modeling Print and Scan Operations Used for Watermarking. In: Kim, HJ., Katzenbeisser, S., Ho, A.T.S. (eds) Digital Watermarking. IWDW 2008. Lecture Notes in Computer Science, vol 5450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04438-0_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04438-0_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04437-3

  • Online ISBN: 978-3-642-04438-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics