Identity statement area
Reference TypeConference Paper (Conference Proceedings)
Last Update2007: administrator
Metadata Last Update2020: administrator
Citation KeyKimMaye:2007:DaHiBi
TitleData Hiding for Binary Documents Robust to Print-Scan, Photocopy and Geometric Distortions
FormatPrinted, On-line.
DateOct. 7-10, 2007
Access Date2021, Jan. 16
Number of Files1
Size250 KiB
Context area
Author1 Kim, Hae Yong
2 Mayer, Joceli
Affiliation1 Escola Politécnica, Universidade de São Paulo
2 LPDS/EEL, Universidade Federal de Santa Catarina
EditorFalcão, Alexandre Xavier
Lopes, Hélio Côrtes Vieira
Conference NameBrazilian Symposium on Computer Graphics and Image Processing, 20 (SIBGRAPI)
Conference LocationBelo Horizonte
Book TitleProceedings
PublisherIEEE Computer Society
Publisher CityLos Alamitos
Tertiary TypeFull Paper
History2007-07-19 15:13:18 :: -> administrator ::
2007-08-02 21:17:21 :: administrator -> ::
2008-07-17 14:09:42 :: -> administrator ::
2009-08-13 20:38:21 :: administrator -> banon ::
2010-08-28 20:02:27 :: banon -> administrator ::
2020-02-19 03:06:18 :: administrator -> :: 2007
Content and structure area
Is the master or a copy?is the master
Content Stagecompleted
Content TypeExternal Contribution
KeywordsData hiding, watermarking, document authentication, print-scan resilience, photocopy resilience.
AbstractThis paper presents a data hiding technique for printed bicolor documents. It inserts tiny dots, hardly noticeable at normal reading distance, to embed the message. For message extraction, we employ auto-correlation and tiny registration dots to rectify geometric distortions. This technique is robust to distortions resulting from print-scan operations, good quality photocopies, affine transformations and scribblings/stains on the paper. The technique can be applied to documents with large white (or black) areas and they may present characters, drawings, schematics, diagrams, cartoons, but not halftones. The technique is intended to be neither a robust watermark (because any filtering can remove the dots) nor a covert communication (because the dots are perceptible at short distance). Nevertheless, when combined with a perceptual hashing and a cryptography protocol, it can be applied as semi-fragile authentication watermarking for hardcopy two-tone documents. In some situations, the utilization of the proposed system can substitute the use of notarial authenticated photocopies.
source Directory Contentthere are no files
agreement Directory Contentthere are no files
Conditions of access and use area
data URL
zipped data URL
Target FileKim-DataHiding.pdf
Allied materials area
Notes area
Empty Fieldsaccessionnumber archivingpolicy archivist area callnumber copyholder copyright creatorhistory descriptionlevel dissemination documentstage doi e-mailaddress edition electronicmailaddress group holdercode isbn issn label lineage mark nextedition nexthigherunit notes numberofvolumes orcid organization pages parameterlist parentrepositories previousedition previouslowerunit progress project readergroup readpermission resumeid rightsholder secondarydate secondarykey secondarymark secondarytype serieseditor session shorttitle sponsor subject tertiarymark type url versiontype volume