Anti-Print and Scan Halftone Watermarking Algorithm Based on Edge Detection

Article Preview

Abstract:

In order to resist print and scan attacks, a kind of digital halftone image watermarking algorithm is proposed, which is based on the edge detection and improved error diffusion. The edge of gray image is gotten using canny detection. Calculate the noise visibility function values of the edge points. Then, sort the values in ascending order and select the size that equal to the length of watermark as the location of watermark embedding. While the grayscale image turns to halftone image using the improved error diffusion algorithm, binary watermark is embedded in the edge position. Watermark is pretreated with Arnold before embedding to improve the safety of watermark. Experiment results show that the algorithm is good resistance to print and scan attacks, while resistance to shearing, noise and jpeg compression attacks.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1210-1213

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jaishri Chourasia, M. B Potdar, Abdul Jhummarwala(2012)Halftone Image Watermarking based on Visual Cryptography. International Journal of Computer Applications(0975-8887), Vol 41-No. 20.

DOI: 10.5120/5805-8010

Google Scholar

[2] Jing-Ming Guo, Yun-Fu Liu(2010), Hiding Multitone Watermarks in Halftone Images, Vol. 17 No. 1, 34-43.

Google Scholar

[3] AM Attar, MJ Omid, S Sadri(2006), Data Hiding in Halftone Images Using Error Diffusion Halftoning Method with Adaptive Thresholding, Taheri-Proc. 14th Iranian Conference.

DOI: 10.1109/ccece.2006.277391

Google Scholar

[4] Wojciech Mokrzycki, Marek Samko(2012), Canny Edge Detection Algorithm Modification, Lecture Notes in Computer Science, Vol: 7594/2012, 533-540.

DOI: 10.1007/978-3-642-33564-8_64

Google Scholar

[5] Bin Shahid, Abdur Rahman(2012), An image watermarking approach based on Set Partitioning in Hierarchical Trees(SPIHT) algorithm. Informatics, Electronics& Vision(ICIEV), 487-492.

DOI: 10.1109/iciev.2012.6317458

Google Scholar