OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Vol. 49, Iss. 7 — Mar. 1, 2010
  • pp: 1170–1178

Hologram-based watermarking capable of surviving print-scan process

Shuozhong Wang, Sujuan Huang, Xinpeng Zhang, and Wei Wu  »View Author Affiliations


Applied Optics, Vol. 49, Issue 7, pp. 1170-1178 (2010)
http://dx.doi.org/10.1364/AO.49.001170


View Full Text Article

Enhanced HTML    Acrobat PDF (1142 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We propose a watermarking scheme for hardcopy pictures based on computer-generated holography. A hologram of the watermark is produced using a conjugate-symmetric extension technique, and its spectrum is inserted into the discrete cosine transform domain of the image. Adjusting the watermark placement in a data array, a trade-off between transparency and robustness is achieved. Anticropping and the interference-resisting capability of holograms make the watermark robust against manipulations commonly performed on digital images during postprocessing, including contrast enhancement, moderate smoothing and sharpening, and, in particular, geometric transformation. Most importantly, the proposed hologram-based watermarking can withstand the printing-scanning attack and, therefore, is useful in protecting copyright of digital photographs both as electronic and hardcopy versions.

© 2010 Optical Society of America

OCIS Codes
(090.1760) Holography : Computer holography
(100.2000) Image processing : Digital image processing

ToC Category:
Holography

History
Original Manuscript: October 13, 2009
Revised Manuscript: January 10, 2010
Manuscript Accepted: January 22, 2010
Published: February 26, 2010

Citation
Shuozhong Wang, Sujuan Huang, Xinpeng Zhang, and Wei Wu, "Hologram-based watermarking capable of surviving print-scan process," Appl. Opt. 49, 1170-1178 (2010)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-49-7-1170


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. A. Levy and D. Shaked, “A transform domain hardcopy watermarking scheme,” Tech. Rep. HPL-2001-309 (Hewlett-Packard, 2001).
  2. A. Levy and D. Shaked, “Hardcopy watermarking,” U.S. patent 6,775,393 (Filing date: 23 April 2001. Publication date: 10 August 2004).
  3. R. Vikas and K. K. Barman, “A report on print-scan resilient information hiding in images,” Tech. Rep. (Hewlett-Packard Labs, 2005).
  4. K. Solanki, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, “Estimating and undoing rotation for print-scan resilient data hiding,” in Proc. ICIP 1, 39-42(2004). [CrossRef]
  5. K. Solanki, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, “Modeling the print-scan process for resilient data hiding,” in Proc. SPIE 5681, 418-429 (2005). [CrossRef]
  6. X. Kang, X. Zhong, J. Huang, and W. Zeng, “An efficient print-scanning resilient data hiding scheme based on a novel LPM,” in Proceedings of the 15th IEEE International Conference on Image Processing (IEEE, 2008), pp. 2080-2083. [CrossRef]
  7. N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt. 41, 865-873 (2002). [CrossRef] [PubMed]
  8. H. T. Chang and C. L. Tsan, “Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain,” Appl. Opt. 44, 6211-6219 (2005). [CrossRef] [PubMed]
  9. K. T. Kim, J. W. Kim, J. S. Lee, and J. U. Choi, “Holographic image watermarking for secure content,” Lect. Notes Comput. Sci. 3184, 219-231 (2004). [CrossRef]
  10. K. T. Kim, J. H. Choi, J. W. Kim, J. U. Choi, and E. S. Kim, “Multiple image watermarking using 3D Fresnel holograms with off-axis,” Proc. SPIE 5404, 573-584 (2004). [CrossRef]
  11. G. S. Spagnolo, C. Simonetti, and L. Cozzella, “Content fragile watermarking based on a computer generated hologram coding technique,” J. Optics A: Pure Appl. Opt. 7, 333-342 (2005). [CrossRef]
  12. G. S. Spagnolo and M. De Santis, “Computer generated hologram for semifragile watermarking with encrypted images,” Int. J. Signal Proc. 4, 133-141 (2008).
  13. G. S. Spagnolo and M. De Santis, “Holographic semi-fragile watermarking combined with asymmetric cryptography,” in Proceedings of the International Conference on Visualization, Imaging, and Image Processing (IASTED, 2008).
  14. C.-J. Cheng and L.-C. Lin, “Correlation-based watermarking by a digital holographic technique,” Opt. Eng. 44, 010501(2005). [CrossRef]
  15. C.-J. Cheng, L.-C. Lin, and W.-T. Dai, “Construction and detection of digital holographic watermarks,” Opt. Commun. 248, 105-116 (2005). [CrossRef]
  16. L.-C. Lin, “The theoretical analysis of a nonlinear holographic watermarking system,” J. Optics A: Pure Appl. Opt. 10, 055305 (2008). [CrossRef]
  17. L.-C. Lin and C.-L. Chen, “Statistical detection of digital holographic watermarking system,” Opt. Commun. 281, 4282-4290 (2008). [CrossRef]
  18. L. J. Sun and S. L. Zhuang, “Watermarking by encrypted Fourier holography,” Opt. Eng. 46, 085801 (2007). [CrossRef]
  19. S. Huang, S. Wang, and Y. Yu, “Computer generated holography based on Fourier transform using conjugate symmetric extension,” Acta Phys. Sin. 58, 952-958 (2009) (in Chinese).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited