Skip to main content
Log in

A robust watermarking approach for security issue of binary documents using fully convolutional networks

  • Original Paper
  • Published:
International Journal on Document Analysis and Recognition (IJDAR) Aims and scope Submit manuscript

Abstract

Motivated by increasing possibility of the tampering of genuine documents during a transmission over digital channels, we focus on developing a watermarking framework for determining whether a received document is genuine or falsified, which is performed by hiding a security feature or secret information within it. To begin with, the input document is transformed into a standard form to minimize geometric distortion. Fully convolutional network (FCN) is utilized to detect document’s watermarking regions. Next, we construct hiding patterns used for hiding secret information. Modifying pixel values of these patterns for carrying secret bits depends on the edge and corner features of document content and the connectivity of their neighboring pixels. Lastly, the watermarking process is conducted by either changing the center pixel of the hiding patterns or changing the ratio between the number of edge features and the number of corner features of subregions within the watermarking regions. The experiments are performed on various binary documents, and our approach gives competitive performance compared to state-of-the-art approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. http://personal.psu.edu/xuy111/projects/cvpr2017_doc

  2. http://iapr-tc10.univ-lr.fr/index.php/resources/dataset-and-software/24-resources/databases/296-l3i-textcopies-dataset

  3. Apostolos, A., Bridson, D., Papadopoulos, C., Pletschacher, S.: A realistic dataset for performance evaluation of document layout analysis. ICDAR ’09 (2009)

  4. Benoraira, A., Benmahammed, K., Boucenna, N.: Blind image watermarking technique based on differential embedding in DWT and DCT domains. EURASIP 2015(1), 55 (2015)

    Google Scholar 

  5. Bay, H., Ess, A., Tuytelaars, T., Van Gool, L.: Speeded-up robust features (surf). Comput. Vis. Image Underst., (2008)

  6. Cao, H., Kot, A.C.: On establishing edge adaptive grid for bilevel image data hiding. IEEE Trans. Inf. Forensics Secur. 8(9), 1508–1518 (2013)

    Article  Google Scholar 

  7. Cheng, J., Kot, A.C.: Objective distortion measure for binary text image based on edge line segment similarity. IEEE Trans. Image Process. 16(6), 1691–1695 (2007)

    Article  MathSciNet  Google Scholar 

  8. Chetan, K., Nirmala, S.: An efficient and secure robust watermarking scheme for document images using integer wavelets and block coding of binary watermarks. Trans. Inf. Security Appl. 24, 13–24 (2015)

    Google Scholar 

  9. Cu, V.L., Burie, J.C., Ogier, J.M.: Document images watermarking for security issue using fully convolutional networks. In: International Conference on Pattern Recognition (2018)

  10. Cu, V.L., Burie, J.C., Ogier, J.M.: Stable regions and object fill-based approach for document images watermarking. In: 13th IAPR International Workshop on Document Analysis Systems (2018)

  11. Cunha, A.L.D., Zhou, J., Do, M.N.: The nonsubsampled contourlet transform: Theory, design, and applications. IEEE Trans. Image Process. 15(10), 3089–3101 (2006)

    Article  Google Scholar 

  12. Daraee, F., Mozaffari, S.: Watermarking in binary document images using fractal codes. Pattern Recogn. Lett. 35(2014), 120–129 (2014)

    Article  Google Scholar 

  13. Hamid, A.S., Mansour, J.: Robust watermarking against print and scan attack through efficient modeling algorithm. Image Commun. 29(10), 1181–1196 (2014)

    Google Scholar 

  14. Haribabu, K., Subrahmanyam, G.R.K.S., Mishra, D.: A robust digital image watermarking technique using auto encoder based convolutional neural networks. In: WCI (2015)

  15. Hieu, V., Dang, W., Kinsner, Y.W.: Multiobjective image data hiding based on neural networks and memetic optimization. WSEAS Trans. Signal Process. 10, 645–661 (2014)

    Google Scholar 

  16. Hou, Q., Junping, D., Li, L., Lu, J., Chang, C.C.: Scanned binary image watermarking based on additive model and sampling. Multimedia Tools Appl. 74(21), 9407–9426 (2015)

    Article  Google Scholar 

  17. Hu, S.: Document image watermarking based on weight-invariant partition using support vector machine. In: DAS VI (2004)

  18. Jamali, M., Rafiee, S., Soroushmehr, S.M.R., Karimi, N., Shirani, S., Najarian, K., Samavi, S.: Adaptive blind image watermarking using fuzzy inference system based on human visual perception. CoRR (2017)

  19. Jinn, H.S., Didi, R., Pingzhi, F., Xian, W., Khurram, K.M.: An adaptive watermarking scheme for e-government document images. Multimedia Tools Appl. 72(3), 3085–3103 (2014)

    Article  Google Scholar 

  20. Jung, K.H., Kee-Young, Y.: Data hiding method in binary images based on block masking for key authentication. Inf. Sci. 277, 188–196 (2014)

    Article  Google Scholar 

  21. Kim, Y.W., Moon, K., Oh, I.S.: A text watermarking algorithm based on word classification and inter-word space statistics. In: ICDAR ’03 (2003)

  22. Kim, Y.W., Seok, O.: Watermarking text document images using edge direction histograms. Pattern Recogn. Lett. 25(11), 1243–1251 (2004)

    Article  Google Scholar 

  23. Lee, Y., Kim, H., Park, Y.: A new data hiding scheme for binary image authentication with small image distortion. Inf. Sci. 179(22), 3866–3884 (2009)

    Article  Google Scholar 

  24. Li, L., Hou, Q., Lu, J., Xu, Q., Dai, J., Mao, X., Chang, C.C.: A new pixels flipping method for huge watermarking capacity of the invoice font image. Sci. World J. 2014, 895063 (2014). https://doi.org/10.1155/2014/895063

    Article  Google Scholar 

  25. Lu, H., Shi, X., Shi, Y.Q., Kot, A.C., Chen, L.: Watermark embedding in DC components of DCT for binary images. In: MMSP (2002)

  26. Munib, S., Khan, A.: Robust image watermarking technique using triangular regions and zernike moments for quantization based embedding. Multimed. Tools Appl. 76(6), 8695–8710 (2017)

    Article  Google Scholar 

  27. Matas, J., Chum, O., Urban, M., Pajdla, T.: Robust wide baseline stereo from maximally stable extremal regions. Image Vision Comput. 22(10), 761–767 (2002)

    Article  Google Scholar 

  28. Mun, S.M., Nam, S.H., Jang, H.U., K., D., Lee, H.K.: A robust blind watermarking using convolutional neural network. CoRR (2017)

  29. Nguyen, T.S., Chang, C.C., Hsueh, H.S.: High capacity data hiding for binary image based on block classification. Multimed. Tools Appl. 75(14), 8513–8526 (2016)

    Article  Google Scholar 

  30. Palit, S., Garain, U.: A novel technique for the watermarking of symbolically compressed documents. In: DIAL’06, vol. 2006 (2006)

  31. Shelhamer, E., Long, J., Darrell, T.: Fully convolutional networks for semantic segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 39(4), 640–651 (2017)

    Article  Google Scholar 

  32. Shih, F.Y.: Digital Watermarking and Steganography: Fundamentals and Techniques, 2 edn (2017)

  33. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. CoRR (2014)

  34. Tan, L., Sun, X., Sun, G.: Print-scan resilient text image watermarking based on stroke direction modulation for chinese document authentication. Radioengineering (2012)

  35. Varna, A.L., Rane, S., Vetro, A.: Data hiding in hard-copy text documents robust to print, scan and photocopy operations. In: International Conference on Acoustics, Speech and Signal Processing (2009)

  36. Wang, C., Chang, Y., Chang, C., Jan, J., Lin, C.: A high capacity data hiding scheme for binary images based on block patterns. J. Syst. Softw. 93(2014), 152–162 (2014)

    Article  Google Scholar 

  37. Xiao, C., Zhang, C., Zheng, C.: Fontcode: embedding information in text documents using glyph perturbation. ACM Trans. Graph 37(2), 1–16 (2018)

    Article  Google Scholar 

  38. Yang, H., Kot, A.C.: Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans. Multimed. 9(3), 475–486 (2007)

    Article  Google Scholar 

  39. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

  40. Zeng, X.T., Ping, L.D., Pan, X.Z.: A lossless robust data hiding scheme. Pattern Recogn. 43(4), 1656–1667 (2010)

    Article  MATH  Google Scholar 

  41. Zolotavkin, Y., Juhola, M.: A new two-dimensional quantization method for digital image watermarking. In: ICACT (2015)

  42. Zou, D., Shi, Y.Q.: Formatted text document data hiding robust to printing, copying and scanning. In: ISCAS (2005)

Download references

Acknowledgements

This work is supported by the CPER NUMERIC programme funded by the Region Nouvelle Aquit-aine, CDA, Charente Maritime French Department, La Roche-lle conurbation authority (CDA) and the European Union through the FEDER funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Trac Nguyen.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cu, V.L., Nguyen, T., Burie, JC. et al. A robust watermarking approach for security issue of binary documents using fully convolutional networks. IJDAR 23, 219–239 (2020). https://doi.org/10.1007/s10032-020-00355-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10032-020-00355-z

Keywords

Navigation