A Fragile Associative Watermarking on 2D Barcode for Data Authentication

نویسندگان

  • Jau-Ji Shen
  • Po-Wei Hsu
چکیده

Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing with watermark technique on 2D barcode to prevent it from counterfeited or prepensely tampered. The existent methods still have to limit the size of embedded watermark in a relatively small portion. Furthermore, it also needs to utilize original watermark or other auxiliary verification mechanism to achieve the barcode verification. In this paper, we propose a method called associative watermarking which is conducted by the concept of Association Rules (ARs) and the idea of Vector Quantization (VQ). Our method is a kind of blind watermarking, and it also can free the size limitation of an embedded watermark. Performing associative watermarking to 2D barcode can reduce the embedded information amount, and using VQ indexing scheme can easily recall the embedded watermark for the purpose of barcode data authentication. The experiment demonstrates that our method can significantly save the information hiding capacity of 2D barcode and detects a counterfeited or prepensely tampered 2D barcode data correctly.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Fundamental Study on Digital Video Watermarking for Two-Dimensional Barcodes Displayed on Mobile Phone Screens

Two-dimensional barcodes (2D codes) have become common as an authentification way of e-tickets and e-coupons. However, easy replication by using other mobile phone camera is apprehended. This paper proposes a method for detecting copied 2D code by a semi-fragile digital video watermark which can be destroyed by replication. Compared to digital image watermarking, it is more difficult to copy 2D...

متن کامل

Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps

For 2D vector maps, obtaining high tamper localization accuracy without requiring extra space is a technically challenging problem. Using an adaptive group division approach and an improved reversible data hiding approach, the author proposes a reversible fragile watermarking method for locating tampered Polylines/Polygons in 2D vector maps. In particular, the author adaptively divide the featu...

متن کامل

Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images

With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people’s attention. The fragile watermark for integrity authentication of image data and protection of copyright has become a hotspot. In the storage and transmission process, image data must be compressed to ...

متن کامل

Watermarking-Based Digital Audio Data Authentication

Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing. Existing concepts address mainly image data. Depending on the necessary security level and the sensitivity to detect changes in the media, we differentiate ...

متن کامل

A Fragile Watermarking Scheme for Color Image Authentication

In this paper, a fragile watermarking scheme is proposed for color image specified object’s authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image andYS T ⊥ , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-over...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2008