Close
Metadata

@InProceedings{KimMaye:2007:DaHiBi,
               author = "Kim, Hae Yong and Mayer, Joceli",
          affiliation = "Escola Polit{\'e}cnica, Universidade de S{\~a}o Paulo and 
                         LPDS/EEL, Universidade Federal de Santa Catarina",
                title = "Data Hiding for Binary Documents Robust to Print-Scan, Photocopy 
                         and Geometric Distortions",
            booktitle = "Proceedings...",
                 year = "2007",
               editor = "Falc{\~a}o, Alexandre Xavier and Lopes, H{\'e}lio C{\^o}rtes 
                         Vieira",
         organization = "Brazilian Symposium on Computer Graphics and Image Processing, 20. 
                         (SIBGRAPI)",
            publisher = "IEEE Computer Society",
              address = "Los Alamitos",
             keywords = "Data hiding, watermarking, document authentication, print-scan 
                         resilience, photocopy resilience.",
             abstract = "This paper presents a data hiding technique for printed bicolor 
                         documents. It inserts tiny dots, hardly noticeable at normal 
                         reading distance, to embed the message. For message extraction, we 
                         employ auto-correlation and tiny registration dots to rectify 
                         geometric distortions. This technique is robust to distortions 
                         resulting from print-scan operations, good quality photocopies, 
                         affine transformations and scribblings/stains on the paper. The 
                         technique can be applied to documents with large white (or black) 
                         areas and they may present characters, drawings, schematics, 
                         diagrams, cartoons, but not halftones. The technique is intended 
                         to be neither a robust watermark (because any filtering can remove 
                         the dots) nor a covert communication (because the dots are 
                         perceptible at short distance). Nevertheless, when combined with a 
                         perceptual hashing and a cryptography protocol, it can be applied 
                         as semi-fragile authentication watermarking for hardcopy two-tone 
                         documents. In some situations, the utilization of the proposed 
                         system can substitute the use of notarial authenticated 
                         photocopies.",
  conference-location = "Belo Horizonte",
      conference-year = "Oct. 7-10, 2007",
             language = "en",
           targetfile = "Kim-DataHiding.pdf",
        urlaccessdate = "2020, Oct. 26"
}


Close