Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Anti-printing and scanning watermark algorithm for two-value text image based on row space and word space

An anti-print scanning, text image technology, applied in image data processing, image data processing, computing and other directions, can solve the problems of complex watermark embedding and extraction systems, high visibility, low embedding capacity, etc., to avoid quality degradation, widely used. Scope of application, effect of increasing embedded capacity

Inactive Publication Date: 2012-01-04
XIDIAN UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The purpose of the present invention is to address the low embedding capacity, non-blind watermark extraction mode, high visibility after watermark embedding, and watermark embedding and extraction system existing in the existing binary text image watermarking algorithm based on line-shift coding and word-shift coding Complex and other deficiencies, a binary text image watermarking algorithm based on word space and line space that is robust to printing and scanning channels is proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-printing and scanning watermark algorithm for two-value text image based on row space and word space
  • Anti-printing and scanning watermark algorithm for two-value text image based on row space and word space
  • Anti-printing and scanning watermark algorithm for two-value text image based on row space and word space

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] The specific implementation steps of watermark embedding of binary text image refer to Figure 5 ,Described as follows:

[0044] Step 1, extract all line spaces and word spaces in the binary text image.

[0045] According to the binary text image to embed the watermark, obtain all its row space and word space, and form a one-dimensional vector respectively in row-major order, which are respectively recorded as the row space vector Row and the word space vector Word.

[0046] Step 2, scrambling operation.

[0047] In order to improve the invisibility and security of the watermark embedded in the binary text image, a custom scrambling operation is performed on Row and Word. Scrambling rules can be defined by the executor himself. For example, the line / word space vector of the binary text image is scrambled first, then the watermark 01 sequence to be embedded is modulated to the line / word space vector, and finally the scrambled line / word space vector is reversed, so as ...

Embodiment 2

[0064] The specific implementation steps of watermark extraction of binary text images refer to Image 6 ,Described as follows:

[0065] Step 1, extract all line spaces and word spaces in the binary text image.

[0066] Same as step 1 for watermark embedding of binary text images.

[0067] Step 2, scrambling operation.

[0068] Same as step 2 for watermark embedding of binary text images.

[0069] Step 3, block operation.

[0070] Same as step 3 for watermark embedding of binary text images.

[0071] Step 4, demodulate all blocks.

[0072] The demodulation operation is to judge the pulse waveform characteristics of the elements in the block from the divided line / word space vector according to the pulse waveform distribution defined during modulation, so as to extract the embedded watermark information; for example, according to each obtained in step 3 Divide into blocks, and analyze the pulse waveform represented by each block in turn. If the values ​​of the three eleme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a new blind watermark algorithm for a two-value text image, which mainly solves the problems of low watermark embedding capacity, non-blind extraction mode, easy discovery and the like in traditional word shift coding and row shift coding. The watermark algorithm of the invention comprises the realizing steps of: respectively extracting row space and word space in the two-value text image; respectively forming a one-dimensional row space vector and a word space vector by using a row as a main sequence; performing the operation of scrambling, blocking, modulating and inverse scrambling respectively on the row space vector and the word space vector in a watermark embedding process; finally, modifying the size of the row / word space of the two-value text image; and obtaining watermark information for embedding the two-value text image only by respectively performing the operation of scrambling, blocking and demodulation on the row space vector and the word space vector when extracting a watermark. The algorithm enhances the watermark embedding capacity on the premise that high invisibility and strong robustness of the watermark are ensured compared with the traditional word shift coding and row shift coding; and moreover, the embedded watermark information is robust for printing, duplication and scanning channels.

Description

technical field [0001] The invention belongs to the technical field of digital watermarking, and relates to the embedding and extraction of binary text image watermark information, in particular to a new blind watermarking algorithm for binary text images, which ensures the high invisibility and high invisibility of the watermark Under the premise of strong robustness, the watermark embedding capacity is improved, and the embedded watermark information is robust to the printing and scanning channels. Background technique [0002] With the popularization of the Internet and the development of digital communication equipment, information sharing has become a trend. The global village facilitates the sharing of documents, images, videos and various resources among people; at the same time, concepts and information exchange methods such as e-commerce, e-government and digital libraries have been accepted by the public. E-commerce and e-government need to transmit a large number...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 王泉李姗姗潘蓉张克丰罗楠张健美
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products