Real-time and screen-cam robust screen watermarking
Chen, Weitong; Li, Yuheng; Niu, Zhenhao; Xu, Yanyan; Keskinarkaus, Anja; Seppänen, Tapio; Sun, Xiaobing (2024-08-14)
Chen, Weitong
Li, Yuheng
Niu, Zhenhao
Xu, Yanyan
Keskinarkaus, Anja
Seppänen, Tapio
Sun, Xiaobing
Elsevier
14.08.2024
Chen, W., Li, Y., Niu, Z., Xu, Y., Keskinarkaus, A., Seppänen, T., & Sun, X. (2024). Real-time and screen-cam robust screen watermarking. Knowledge-Based Systems, 302, 112380. https://doi.org/10.1016/j.knosys.2024.112380.
https://creativecommons.org/licenses/by/4.0/
© 2024 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
https://creativecommons.org/licenses/by/4.0/
© 2024 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
https://creativecommons.org/licenses/by/4.0/
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:oulu-202409095757
https://urn.fi/URN:NBN:fi:oulu-202409095757
Tiivistelmä
Abstract
Unauthorized photography of screen-loaded information has become a low-cost and difficult-to-trace method for leakage. Many researchers have proposed screen-cam robust watermarking methods for digital images and documents to identify surreptitious photography. However, these methods are designed for specific types of data and cannot be used in real time, which limits their applicability. This study proposes a screen watermarking method that possesses screen-cam robustness and real-time watermark refreshing. Specifically, a resolution-adaptive watermark template was designed that comprises message watermark templates and two types of synchronization watermark templates. To achieve real-time watermark refreshing, the pregenerated watermark template is directly embedded into the back buffer, which represents the content to be loaded onto the screen. A simplified just noticeable difference model was employed to ensure watermark imperceptibility. For watermark extraction, the positions of the embedded synchronization watermark templates are calculated using a synchronization response index method. Based on these positions, we can perform automatic perspective correction and locate the message watermark template embedded region. Finally, the message watermark was extracted from the discrete Fourier transform domain of the noise component. Extensive experiments demonstrated that the watermark refresh rate meets practical requirements and that the proposed method is robust against image-processing attacks and screen-cam attacks.
Unauthorized photography of screen-loaded information has become a low-cost and difficult-to-trace method for leakage. Many researchers have proposed screen-cam robust watermarking methods for digital images and documents to identify surreptitious photography. However, these methods are designed for specific types of data and cannot be used in real time, which limits their applicability. This study proposes a screen watermarking method that possesses screen-cam robustness and real-time watermark refreshing. Specifically, a resolution-adaptive watermark template was designed that comprises message watermark templates and two types of synchronization watermark templates. To achieve real-time watermark refreshing, the pregenerated watermark template is directly embedded into the back buffer, which represents the content to be loaded onto the screen. A simplified just noticeable difference model was employed to ensure watermark imperceptibility. For watermark extraction, the positions of the embedded synchronization watermark templates are calculated using a synchronization response index method. Based on these positions, we can perform automatic perspective correction and locate the message watermark template embedded region. Finally, the message watermark was extracted from the discrete Fourier transform domain of the noise component. Extensive experiments demonstrated that the watermark refresh rate meets practical requirements and that the proposed method is robust against image-processing attacks and screen-cam attacks.
Kokoelmat
- Avoin saatavuus [34589]