TY - GEN
T1 - Self-authentication watermark by digital halftoning
AU - Su, Chao Ting
AU - Wang, Hsi Chun
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2016/1/21
Y1 - 2016/1/21
N2 - In the booming development of computer technology, countless counterfeit products are being forged in the market. Nowadays, many countries have adopted durable and high-security plastic substrates as identification cards or for product protection. The purpose of this study is to adopt digital halftoning technique to embed watermarks onto plastic substrates with self-authentication capability. By using halftoning algorithm with threshold matrices to form binary screen line microstructures with varied spaces, the watermark mask can be converted into an encrypted image via logical operations. Then the encrypted image is output on a plastic substrate. Finally, by bending and overlapping this plastic substrate, the watermark decryption and self-authentication effects can be achieved. The proposed method can be applied to many potential value-added applications and product protection.
AB - In the booming development of computer technology, countless counterfeit products are being forged in the market. Nowadays, many countries have adopted durable and high-security plastic substrates as identification cards or for product protection. The purpose of this study is to adopt digital halftoning technique to embed watermarks onto plastic substrates with self-authentication capability. By using halftoning algorithm with threshold matrices to form binary screen line microstructures with varied spaces, the watermark mask can be converted into an encrypted image via logical operations. Then the encrypted image is output on a plastic substrate. Finally, by bending and overlapping this plastic substrate, the watermark decryption and self-authentication effects can be achieved. The proposed method can be applied to many potential value-added applications and product protection.
KW - digital halftoning
KW - screen line
KW - self-authentication
KW - watermark
UR - http://www.scopus.com/inward/record.url?scp=84964899921&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84964899921&partnerID=8YFLogxK
U2 - 10.1109/CCST.2015.7389709
DO - 10.1109/CCST.2015.7389709
M3 - Conference contribution
AN - SCOPUS:84964899921
T3 - Proceedings - International Carnahan Conference on Security Technology
BT - ICCST 2015 - The 49th Annual IEEE International Carnahan Conference on Security Technology
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 49th Annual IEEE International Carnahan Conference on Security Technology, ICCST 2015
Y2 - 21 September 2015 through 24 September 2015
ER -