Self-authentication watermark by digital halftoning

Chao Ting Su, Hsi-Chun Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In the booming development of computer technology, countless counterfeit products are being forged in the market. Nowadays, many countries have adopted durable and high-security plastic substrates as identification cards or for product protection. The purpose of this study is to adopt digital halftoning technique to embed watermarks onto plastic substrates with self-authentication capability. By using halftoning algorithm with threshold matrices to form binary screen line microstructures with varied spaces, the watermark mask can be converted into an encrypted image via logical operations. Then the encrypted image is output on a plastic substrate. Finally, by bending and overlapping this plastic substrate, the watermark decryption and self-authentication effects can be achieved. The proposed method can be applied to many potential value-added applications and product protection.

Original languageEnglish
Title of host publicationICCST 2015 - The 49th Annual IEEE International Carnahan Conference on Security Technology
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479986910
DOIs
Publication statusPublished - 2016 Jan 21
Event49th Annual IEEE International Carnahan Conference on Security Technology, ICCST 2015 - Taipei, Taiwan
Duration: 2015 Sep 212015 Sep 24

Publication series

NameProceedings - International Carnahan Conference on Security Technology
Volume2015-January
ISSN (Print)1071-6572

Other

Other49th Annual IEEE International Carnahan Conference on Security Technology, ICCST 2015
CountryTaiwan
CityTaipei
Period15/9/2115/9/24

Fingerprint

Authentication
Plastics
Substrates
value added
Masks
market
Microstructure

Keywords

  • digital halftoning
  • screen line
  • self-authentication
  • watermark

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Law

Cite this

Su, C. T., & Wang, H-C. (2016). Self-authentication watermark by digital halftoning. In ICCST 2015 - The 49th Annual IEEE International Carnahan Conference on Security Technology [7389709] (Proceedings - International Carnahan Conference on Security Technology; Vol. 2015-January). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CCST.2015.7389709

Self-authentication watermark by digital halftoning. / Su, Chao Ting; Wang, Hsi-Chun.

ICCST 2015 - The 49th Annual IEEE International Carnahan Conference on Security Technology. Institute of Electrical and Electronics Engineers Inc., 2016. 7389709 (Proceedings - International Carnahan Conference on Security Technology; Vol. 2015-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Su, CT & Wang, H-C 2016, Self-authentication watermark by digital halftoning. in ICCST 2015 - The 49th Annual IEEE International Carnahan Conference on Security Technology., 7389709, Proceedings - International Carnahan Conference on Security Technology, vol. 2015-January, Institute of Electrical and Electronics Engineers Inc., 49th Annual IEEE International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, 15/9/21. https://doi.org/10.1109/CCST.2015.7389709
Su CT, Wang H-C. Self-authentication watermark by digital halftoning. In ICCST 2015 - The 49th Annual IEEE International Carnahan Conference on Security Technology. Institute of Electrical and Electronics Engineers Inc. 2016. 7389709. (Proceedings - International Carnahan Conference on Security Technology). https://doi.org/10.1109/CCST.2015.7389709
Su, Chao Ting ; Wang, Hsi-Chun. / Self-authentication watermark by digital halftoning. ICCST 2015 - The 49th Annual IEEE International Carnahan Conference on Security Technology. Institute of Electrical and Electronics Engineers Inc., 2016. (Proceedings - International Carnahan Conference on Security Technology).
@inproceedings{5d453f8718e04068b86296f1f09aa69d,
title = "Self-authentication watermark by digital halftoning",
abstract = "In the booming development of computer technology, countless counterfeit products are being forged in the market. Nowadays, many countries have adopted durable and high-security plastic substrates as identification cards or for product protection. The purpose of this study is to adopt digital halftoning technique to embed watermarks onto plastic substrates with self-authentication capability. By using halftoning algorithm with threshold matrices to form binary screen line microstructures with varied spaces, the watermark mask can be converted into an encrypted image via logical operations. Then the encrypted image is output on a plastic substrate. Finally, by bending and overlapping this plastic substrate, the watermark decryption and self-authentication effects can be achieved. The proposed method can be applied to many potential value-added applications and product protection.",
keywords = "digital halftoning, screen line, self-authentication, watermark",
author = "Su, {Chao Ting} and Hsi-Chun Wang",
year = "2016",
month = "1",
day = "21",
doi = "10.1109/CCST.2015.7389709",
language = "English",
series = "Proceedings - International Carnahan Conference on Security Technology",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "ICCST 2015 - The 49th Annual IEEE International Carnahan Conference on Security Technology",

}

TY - GEN

T1 - Self-authentication watermark by digital halftoning

AU - Su, Chao Ting

AU - Wang, Hsi-Chun

PY - 2016/1/21

Y1 - 2016/1/21

N2 - In the booming development of computer technology, countless counterfeit products are being forged in the market. Nowadays, many countries have adopted durable and high-security plastic substrates as identification cards or for product protection. The purpose of this study is to adopt digital halftoning technique to embed watermarks onto plastic substrates with self-authentication capability. By using halftoning algorithm with threshold matrices to form binary screen line microstructures with varied spaces, the watermark mask can be converted into an encrypted image via logical operations. Then the encrypted image is output on a plastic substrate. Finally, by bending and overlapping this plastic substrate, the watermark decryption and self-authentication effects can be achieved. The proposed method can be applied to many potential value-added applications and product protection.

AB - In the booming development of computer technology, countless counterfeit products are being forged in the market. Nowadays, many countries have adopted durable and high-security plastic substrates as identification cards or for product protection. The purpose of this study is to adopt digital halftoning technique to embed watermarks onto plastic substrates with self-authentication capability. By using halftoning algorithm with threshold matrices to form binary screen line microstructures with varied spaces, the watermark mask can be converted into an encrypted image via logical operations. Then the encrypted image is output on a plastic substrate. Finally, by bending and overlapping this plastic substrate, the watermark decryption and self-authentication effects can be achieved. The proposed method can be applied to many potential value-added applications and product protection.

KW - digital halftoning

KW - screen line

KW - self-authentication

KW - watermark

UR - http://www.scopus.com/inward/record.url?scp=84964899921&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84964899921&partnerID=8YFLogxK

U2 - 10.1109/CCST.2015.7389709

DO - 10.1109/CCST.2015.7389709

M3 - Conference contribution

AN - SCOPUS:84964899921

T3 - Proceedings - International Carnahan Conference on Security Technology

BT - ICCST 2015 - The 49th Annual IEEE International Carnahan Conference on Security Technology

PB - Institute of Electrical and Electronics Engineers Inc.

ER -