
A Blind Watermarking Method with Strong Robust Based on 2D-barcode
Xiaofei Feng Xingzhong Ji
College of Information Engineering College of Software Engineering
Zhejiang Gongshang University Zhejiang University of Technology
Hangzhou, Zhejiang, China Hangzhou, Zhejiang, China
Abstract—A watermarking technique based on
2D-barcode and human visual system is proposed. A
structured 2D-barcode, PDF417
is used as watermark .
In order to reduce the inserting watermark data, the
2D-barcode is preprocessed before inserted through
omitting border of barcode, heading and ending
characters , reducing barcode’s modules and scrambling
the watermark based on chaotic sequence. A mask of the
source image is modulated based on wavelet transform
and a best region is chosen by using the human visual
system performance. It is a blind watermarking system
because the extraction and detection are independent on
any original information in prior of inserting operation,
restoring the heading and ending characters of the
barcode. This technique enhanced the robust through
watermark structure and embedding algorithm, which
strengthens the resistance for different attacks.
Keywords—-digital watermrk; 2D-barcode; HVS
ĉ.INTRODUCTION
Digital watermark [1] is one of the mains tools to
deal with the copyright issues of digital medium and
content authentication. It inserts some special
information into the digital works directly, which
doesn’t affect the value and use of the original content.
And the digital watermark can’t be detected or noticed
by human visual system, and can be extracted only by
professional devices.
Nowadays the research of digital watermark is
developed rapidly. The watermark system existed can
resist some attacks well, such as signal attack,
geometric attack and protocol attack, yet the robust of
the watermark still need to be improved.
A watermarking algorithm based on 2D-barcode [2]
and HVS is proposed. A structured 2D-barcode,
PDF417ˈis used as watermark . A mask of the original
image is modulated based on wavelet transform and a
best region is chosen by using the human visual
system. This algorithm enhanced the robust through
watermark structure and inserting algorithm, which
strengthens the resistance to different attacks.
Ċ.
PDF417 2D-
BARCODE STRUCTURE
2D-barcode [3] can record data by using the graph
consisted of bars and spaces that are distributed in
plane according to defined rules. PDF 417, one kind of
2D-barcode, is widely applied and has some
characteristics as follows.
1) The encoding capacity is great. Many categories
of information including letter, number, ASCII and
binary number all can be encoded.
2) The correcting capability is strong by adopting
the algorithm of Reed-Solomon.
3) It has self-verified capability.
4) The code structure is defined definitely, which is
useful for assistant operation for standardization.
2009 International Conference on Information Technology and Computer Science
978-0-7695-3688-0/09 $25.00 © 2009 IEEE
DOI 10.1109/ITCS.2009.231
455
2009 International Conference on Information Technology and Computer Science
978-0-7695-3688-0/09 $25.00 © 2009 IEEE
DOI 10.1109/ITCS.2009.231
453
2009 International Conference on Information Technology and Computer Science
978-0-7695-3688-0/09 $25.00 © 2009 IEEE
DOI 10.1109/ITCS.2009.231
453
2009 International Conference on Information Technology and Computer Science
978-0-7695-3688-0/09 $25.00 © 2009 IEEE
DOI 10.1109/ITCS.2009.231
453
2009 International Conference on Information Technology and Computer Science
978-0-7695-3688-0/09 $25.00 © 2009 IEEE
DOI 10.1109/ITCS.2009.231
453
2009 International Conference on Information Technology and Computer Science
978-0-7695-3688-0/09 $25.00 © 2009 IEEE
DOI 10.1109/ITCS.2009.231
453
2009 International Conference on Information Technology and Computer Science
978-0-7695-3688-0/09 $25.00 © 2009 IEEE
DOI 10.1109/ITCS.2009.231
453
2009 International Conference on Information Technology and Computer Science
978-0-7695-3688-0/09 $25.00 © 2009 IEEE
DOI 10.1109/ITCS.2009.231
453
2009 International Conference on Information Technology and Computer Science
978-0-7695-3688-0/09 $25.00 © 2009 IEEE
DOI 10.1109/ITCS.2009.231
453
2009 International Conference on Information Technology and Computer Science
978-0-7695-3688-0/09 $25.00 © 2009 IEEE
DOI 10.1109/ITCS.2009.231
453
2009 International Conference on Information Technology and Computer Science
978-0-7695-3688-0/09 $25.00 © 2009 IEEE
DOI 10.1109/ITCS.2009.231
453
2009 International Conference on Information Technology and Computer Science
978-0-7695-3688-0/09 $25.00 © 2009 IEEE
DOI 10.1109/ITCS.2009.231
452
2009 International Conference on Information Technology and Computer Science
978-0-7695-3688-0/09 $25.00 © 2009 IEEE
DOI 10.1109/ITCS.2009.231
452