Watermark Embedding and Extraction Scheme Design by Two-stage Optimization for Illegal Replication Detection of Two-dimensional Barcodes

Satoshi Ono, Kentaro Nakai, Takeru Maehara, Ryo Ikeda

2015

Abstract

Recently, two-dimensional (2D) barcodes displayed on mobile phones are becoming used for authentification such as airplane boarding pass and online payment. Digital watermarking is promising technology to detect illegal replication or fabrication of such 2D codes. However, due to geometric distortions and/or interferences between patterns of camera sensors and screen pixels, watermark may not be sufficiently extracted from sub-bands which are used when embedding the watermark. This paper proposes a two-stage optimization method for watermark embedding and extracting scheme design. The proposed method discriminates frequency sub-bands between for embedding and extraction, whereas general watermarking schemes extract the watermark from the same subbands as while embedding. To evaluate actual image deterioration by digital-analogue conversion with mobile phone screen and camera, the proposed method uses actual mobile phones to obtain real images of valid and replicated 2D codes. Experimental result have shown that the proposed two-stage optimization of watermark embedding and extracting schemes improved watermark performance for 2D code replication detection.

References

  1. Chu, S.-C., Huang, H.-C., Shi, Y., Wu, S.-Y., and Shieh, C.- S. (2008). Genetic watermarking for zerotree-based applications. Circuits, Systems & Signal Processing, 27(2):171-182.
  2. Eshelman, L. J. and Schaffer, J. D. (1993). Real-coded genetic algorithms and interval-schemata. In Foundations of Genetic Algorithms, volume 2, pages 187- 202.
  3. Goldberg, D. E. (1989). Genetic Algorithms in Search, Optimization, and Machine Learning. Addison Wesley, Reading.
  4. Ho, A. T. S., Shen, J., Tan, H. P., and Woon, J. (2003). Security-printing authentication using digital watermarking. SPIE International Technical Group Newsletter on Electronic Imaging, 13.
  5. Huang, H.-C., Chu, S.-C., Pan, J.-S., Huang, C.-Y., and Liao, B.-Y. (2011). Tabu search based multiwatermarks embedding algorithm with multiple description coding. Information Sciences, 181(16):3379 - 3396.
  6. Kundur, D. and Hatzinakos, D. (1997). A robust digital image watermarking method using wavelet-based fusion. In 4th IEEE Int'l Conf. Image Processing, pages 544-547.
  7. Kundur, D. and Hatzinakos, D. (1998). Digital watermarking using multiresolution wavelet decomposition. In Acoustics, Speech and Signal Processing, 1998. Proceedings of the 1998 IEEE International Conference on, volume 5, pages 2969 -2972 vol.5.
  8. Loukhaoukha, K., Nabti, M., and Zebbiche, K. (2014). A robust svd-based image watermarking using a multi-objective particle swarm optimization. OptoElectronics Review, 22(1):45-54.
  9. Mingzhi, C., Yan, L., Yajian, Z., and Min, L. (2013). A combined dwt and dct watermarking scheme optimized using genetic algorithm. Journal of Multimedia, 8(3).
  10. Ono, S., Maehara, T., Nakai, K., Ikeda, R., and Taniguchi, K. (2014). Semi-fragile watermark design for detecting illegal two-dimensional barcodes by evolutionary multi-objective optimization. In Proceedings of Genetic and Evolutionary Computation Conference (GECCO) (Companion), pages 175-176.
  11. Ono, S., Maehara, T., Sakaguchi, H., Taniyama, D., Ikeda, R., and Nakayama, S. (2013). Self-adaptive niching differential evolution and its application to semifragile watermarking for two-dimensional barcodes on mobile phone screen. In Proceedings of Genetic and Evolutionary Computation Conference (GECCO) (Companion), pages 189-190.
  12. Ono, S., Tsutsumi, M., and Nakayama, S. (2011). A copy detection method for colored two-dimensional code using digital watermarking. The IEICE transactions on information and systems (Japanese edetion), 94(12):1971-1974.
  13. Rao, K. R. and Yip, P. (1990). Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic Press Professional, Inc., San Diego, CA, USA.
  14. Rey, C. and Dugelay, J.-L. (2002). A survey of watermarking algorithms for image authentication. EURASIP Journal on Applied Signal Processing, 6:613-621.
  15. Song, Y., Liu, R., and Tan, T. (2001). Digital Watermarking for Forgery Detetion in Printed Materials, volume 2195/2001, pages 403-410. Springer Verlag.
  16. Vahedi, E., Zoroofi, R. A., and Shiva, M. (2012). Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles. Digital Signal Processing, 22(1):153 - 162.
Download


Paper Citation


in Harvard Style

Ono S., Nakai K., Maehara T. and Ikeda R. (2015). Watermark Embedding and Extraction Scheme Design by Two-stage Optimization for Illegal Replication Detection of Two-dimensional Barcodes . In Proceedings of the 10th International Conference on Computer Vision Theory and Applications - Volume 3: VISAPP, (VISIGRAPP 2015) ISBN 978-989-758-091-8, pages 201-208. DOI: 10.5220/0005358102010208


in Bibtex Style

@conference{visapp15,
author={Satoshi Ono and Kentaro Nakai and Takeru Maehara and Ryo Ikeda},
title={Watermark Embedding and Extraction Scheme Design by Two-stage Optimization for Illegal Replication Detection of Two-dimensional Barcodes},
booktitle={Proceedings of the 10th International Conference on Computer Vision Theory and Applications - Volume 3: VISAPP, (VISIGRAPP 2015)},
year={2015},
pages={201-208},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005358102010208},
isbn={978-989-758-091-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Computer Vision Theory and Applications - Volume 3: VISAPP, (VISIGRAPP 2015)
TI - Watermark Embedding and Extraction Scheme Design by Two-stage Optimization for Illegal Replication Detection of Two-dimensional Barcodes
SN - 978-989-758-091-8
AU - Ono S.
AU - Nakai K.
AU - Maehara T.
AU - Ikeda R.
PY - 2015
SP - 201
EP - 208
DO - 10.5220/0005358102010208