{"title":"混合半色调网点水印的边界处理","authors":"Yen-Hsiang Kao, H. Wang, Tai-Kuang Yu","doi":"10.1109/ICASI.2016.7539790","DOIUrl":null,"url":null,"abstract":"With the flourishing development of computer technology, image duplication can be carried out in a convenient way. In order to protect intellectual property rights, experts are devoted to many anti-counterfeiting technologies. Among them, watermark by hybrid halftone dots is formed by amplitude modulation (AM) dots and frequency modulation (FM) dots. Because of different halftone dots, watermark can be observed by closer look. In this study, we design a boundary processing to make the edge area of two dots gradual change. Then, the visibility is evaluated by Human Visual System (HVS). Results shows the boundary processing can effectively hide watermark, and it can be applied to many document security applications.","PeriodicalId":170124,"journal":{"name":"2016 International Conference on Applied System Innovation (ICASI)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Boundary processing on the watermark with hybrid halftone dots\",\"authors\":\"Yen-Hsiang Kao, H. Wang, Tai-Kuang Yu\",\"doi\":\"10.1109/ICASI.2016.7539790\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the flourishing development of computer technology, image duplication can be carried out in a convenient way. In order to protect intellectual property rights, experts are devoted to many anti-counterfeiting technologies. Among them, watermark by hybrid halftone dots is formed by amplitude modulation (AM) dots and frequency modulation (FM) dots. Because of different halftone dots, watermark can be observed by closer look. In this study, we design a boundary processing to make the edge area of two dots gradual change. Then, the visibility is evaluated by Human Visual System (HVS). Results shows the boundary processing can effectively hide watermark, and it can be applied to many document security applications.\",\"PeriodicalId\":170124,\"journal\":{\"name\":\"2016 International Conference on Applied System Innovation (ICASI)\",\"volume\":\"113 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Applied System Innovation (ICASI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICASI.2016.7539790\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Applied System Innovation (ICASI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASI.2016.7539790","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Boundary processing on the watermark with hybrid halftone dots
With the flourishing development of computer technology, image duplication can be carried out in a convenient way. In order to protect intellectual property rights, experts are devoted to many anti-counterfeiting technologies. Among them, watermark by hybrid halftone dots is formed by amplitude modulation (AM) dots and frequency modulation (FM) dots. Because of different halftone dots, watermark can be observed by closer look. In this study, we design a boundary processing to make the edge area of two dots gradual change. Then, the visibility is evaluated by Human Visual System (HVS). Results shows the boundary processing can effectively hide watermark, and it can be applied to many document security applications.