US20040120544A1 - Digital-watermark embedding method and device and storage medium for storing the method - Google Patents

Digital-watermark embedding method and device and storage medium for storing the method Download PDF

Info

Publication number
US20040120544A1
US20040120544A1 US10/659,037 US65903703A US2004120544A1 US 20040120544 A1 US20040120544 A1 US 20040120544A1 US 65903703 A US65903703 A US 65903703A US 2004120544 A1 US2004120544 A1 US 2004120544A1
Authority
US
United States
Prior art keywords
digital
watermark information
embedding
image
embedded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/659,037
Inventor
Takami Eguchi
Keiichi Iwamura
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Canon Inc
Original Assignee
Canon Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Canon Inc filed Critical Canon Inc
Assigned to CANON KABUSHIKI KAISHA reassignment CANON KABUSHIKI KAISHA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EGUCHI, TAKAMI, IWAMURA, KEIICHI
Publication of US20040120544A1 publication Critical patent/US20040120544A1/en
Priority to US11/740,770 priority Critical patent/US7386149B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0078Robust watermarking, e.g. average attack or collusion attack resistant using multiple thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • H04N1/32219Spatial or amplitude domain methods involving changing the position of selected pixels, e.g. word shifting, or involving modulating the size of image components, e.g. of characters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/3232Robust embedding or watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness

Definitions

  • the present invention relates to a technique for embedding digital-watermark information in an image.
  • Digital-watermark embedding has been known as a technique for preventing unauthorized duplication.
  • original digital image data is modulated so that the data is imperceptible or difficult to perceive, and another piece of information is embedded in the data.
  • FIG. 24 shows an example of the above-described known art. For example, when a letter is rotated clockwise, “1” is embedded therein as shown in ( 1 ) in FIG. 24. When a letter is rotated counterclockwise, “0” is embedded therein as shown in ( 2 ) in FIG. 24. Watermark may be embedded in sequential letters, or every few letters, or in a letter at a predetermined position. In FIG. 24, the letter “C” is rotated clockwise and the letter “E” is rotated counterclockwise. Accordingly, information “10” is embedded in this case.
  • image data represents a monochrome multivalued image for clarity.
  • a binary data sequence is regarded as additional information Inf.
  • the additional information Inf is information including some bits, each bit representing “0” or “1”.
  • digital-watermark information w is generated based on the additional information Inf.
  • an image is scanned by raster scanning and the additional information Inf is associated with the position of image data I. When a bit represents “0”, ⁇ 1 is allocated, and when a bit represents “1”, +1 is allocated.
  • the image data I and the digital-watermark information w are input, the digital-watermark information w is embedded in the image data I, and then image data I′ in which the digital-watermark information w is embedded is output.
  • I′ i,j is image data in which digital-watermark information is embedded
  • I i,j is image data before the digital-watermark information is embedded therein
  • w i,j is the digital-watermark information
  • i and j are parameters representing x and y coordinates of I and I′ and w, respectively
  • a is a parameter specifying the embedding strength of the digital-watermark.
  • the strength a will be described.
  • the strength a is “0.01”
  • digital-watermark information which is robust to attack can be embedded. In that case, however, quality of the image is significantly degraded.
  • the robustness to attack will be reduced. In that case, however, degradation of the image quality can be suppressed.
  • the amount of information which can be embedded is generally proportional to the number of letters.
  • the documents may include newspapers, presentation material, and postcards, and the number of letters included in these documents is different from each other. Therefore, when digital-watermark information is embedded in a document image, it is difficult and is not preferable to estimate the amount of information which can be embedded therein in advance.
  • the present invention has been made in view of the above-described problems, and it is a major object of the present invention to efficiently embedding digital-watermark information in an image by considering the above-described three elements. In particular, it is an object of the present invention to provide an effective technique of embedding digital-watermark information in a document image.
  • a digital-watermark embedding method of the present invention comprises: a generating step of generating digital-watermark information; an input step of inputting an image; a setting step of setting a first parameter determining robustness to attack on the digital-watermark information embedded in the image and a second parameter determining quality of the image in which the digital-watermark information is embedded; an embedding step of embedding the digital-watermark information in the input image by using the first and second parameters; a determination step of determining whether or not the entire digital-watermark information can be embedded in the image; an update step of updating one of the parameters so as to embed a larger amount of digital-watermark information in the image when it is determined that the entire digital-watermark information cannot be embedded in the determination step, the update step being performed as a first stage; and an embedding step of embedding the digital-watermark information in the input image again by using the updated parameter.
  • the determination step is performed for each of the embedding steps.
  • FIG. 1 shows a basic configuration of a digital-watermark embedding device.
  • FIG. 2 shows the configuration of a digital-watermark embedding device of a first embodiment.
  • FIG. 3 is a flowchart of an operation of the digital-watermark embedding device shown in FIG. 2.
  • FIG. 4 is a flowchart showing a method of embedding digital-watermark by changing the inclination angle of a letter.
  • FIG. 5 is a flowchart showing a process in a robustness-priority forced embedding mode.
  • FIG. 6 shows a state of change in f(n) and g( ⁇ ).
  • FIG. 7 is a flowchart showing a process in an image-quality-priority forced embedding mode.
  • FIG. 8 shows change in parameters in the image-quality-priority forced embedding mode.
  • FIG. 9 is a flowchart showing a process in the robustness-priority forced embedding mode.
  • FIG. 10 shows a state of change in f and g.
  • FIG. 11 is a flowchart showing a process in the image-quality-priority forced embedding mode.
  • FIG. 12 is a flowchart showing an operation of a digital-watermark embedding device having a function of changing pages of document image in which digital-watermark information is to be embedded.
  • FIG. 13 is a flowchart showing an operation of the digital-watermark embedding device having a function of changing pages of document image in which digital-watermark information is embedded.
  • FIG. 14 shows part of document image before digital-watermark information is embedded therein.
  • FIG. 15 shows part of document image after digital-watermark information is embedded therein.
  • FIG. 16 shows the configuration of a digital-watermark embedding device according to a fifth embodiment.
  • FIG. 17 is a flowchart of an operation of the digital-watermark embedding device shown in FIG. 16.
  • FIG. 18 is a flowchart showing a method of embedding digital-watermark by changing the inclination angle of a letter.
  • FIG. 19 is a flowchart of an embedding process performed by using an embedding capacity checking unit and an image-quality/robustness parameters control unit.
  • FIG. 20 shows combinations of values for obtaining each embedding capacity.
  • FIG. 21 shows combinations of values corresponding to each embedding strength.
  • FIG. 22 is a flowchart showing an operation of a digital-watermark embedding device according to a sixth embodiment.
  • FIG. 23 shows the internal configuration of the digital-watermark embedding device.
  • FIG. 24 shows an example of a known technique for embedding digital-watermark.
  • FIG. 1 shows a basic configuration of the digital-watermark embedding device which can be applied to the embodiments of the present invention.
  • the digital-watermark embedding device basically includes an image input unit 101 ; a watermark information embedding unit 102 ; an image-quality/robustness parameters control unit 106 ; and an image output unit 107 .
  • an image (original image 100 ) to which digital-watermark information 103 is to be embedded is input to the image input unit 101 (for example, a scanner 1417 in FIG. 23, described later).
  • the digital-watermark information 103 , embedding strength 104 , and an embedding mode 105 are input to the watermark information embedding unit 102 .
  • the watermark information embedding unit 102 embeds the digital-watermark information in the original image 100 by using the input digital-watermark information 103 , the embedding strength 104 , and the embedding mode 105 . Accordingly, a water-marked image 108 is generated.
  • the water-marked image 108 is output from the image output unit 107 (for example, a printer 1416 in FIG. 23, described later).
  • a normal mode and two types of forced embedding modes are provided as the embedding mode 105 .
  • an initial value of a parameter group for deciding robustness/image-quality degradation is set based on specified embedding strength 104 .
  • the outline of each mode will be described.
  • the forced embedding mode includes two types of modes: a robustness-priority forced embedding mode and an image-quality-priority forced embedding mode.
  • the robustness-priority forced embedding mode is used for generating the water-marked image 108 which is robust to future possible attacks, such as image editing. Therefore, in this mode, the parameter group is changed so that the robustness to attack can be maintained while the image quality is degraded.
  • a larger amount of digital-watermark information can be embedded, and thus the desired amount of digital-watermark information may be embedded.
  • the parameter group is changed so as to degrade the image quality
  • degradation of the image quality may reach its limit.
  • the parameter is changed so as to reduce the robustness to attack within the tolerance.
  • the threshold value may have a plurality of levels.
  • the image quality may be degraded first, and then the parameter group may be changed in the following order: degrade image quality, reduce robustness, degrade image quality, reduce robustness, degrade image quality, . . . .
  • the image-quality-priority forced embedding mode is used for minimizing degradation of the quality of the water-marked image 108 . Therefore, when the desired amount of digital-watermark information cannot be embedded, the parameter is first changed so as to reduce the robustness to attack, not to degrade the image quality.
  • a larger amount of digital-watermark information can be embedded, and thus the desired amount of digital-watermark information may be embedded.
  • the parameter group is changed so as to reduce the robustness to attack, degradation of the robustness may reach its limit.
  • the degradation of robustness to attack reaches its limit, the parameter is changed so as to degrade the image quality within the tolerance.
  • the threshold value may have a plurality of levels.
  • the robustness to attack may be reduced first, and then the parameter group may be changed in the following order: reduce robustness, degrade image quality, reduce robustness, degrade image quality, reduce robustness, . . . .
  • FIG. 2 shows the configuration of a digital-watermark embedding device of the first embodiment.
  • the digital-watermark embedding device includes an image input unit 201 ; a watermark information embedding unit 207 ; an image-quality/robustness parameters control unit 208 ; and an image output unit 209 .
  • a region-segmentation unit 202 for dividing a region of an input original image 200 and a circumscribed rectangle extracting unit 203 for extracting a region of a letter are provided.
  • Digital-watermark information 204 , embedding strength 205 , and an embedding mode 206 are the same as the above-described digital-watermark information 103 , the embedding strength 104 , and the embedding mode 105 , respectively.
  • FIG. 3 is a flowchart for explaining the operation of the digital-watermark embedding device shown in FIG. 2.
  • the operation of the digital-watermark embedding device shown in FIG. 2 will be described with reference to the flowchart shown in FIG. 3.
  • a document image (original image 200 ) to which digital-watermark information is to be embedded is read through the image input unit 201 and is input to the region-segmentation unit 202 (step S 301 ).
  • the region-segmentation unit 202 segments the input document image into a plurality of attribute regions: a text region, a figure region, a graphic region, a table region, and so on (step S 302 ).
  • the circumscribed rectangle extracting unit 203 extracts circumscribed rectangles of letters included in the text region (step S 303 ).
  • a circumscribed rectangle of a letter is a rectangle circumscribing a letter, and is generally known as a region for recognizing a letter. In this embodiment, however, the circumscribed rectangle is used as a minimum unit to be operated for embedding digital-watermark information.
  • each pixel value of the document image is projected onto a vertical coordinate axis. Then, a blank part (part without a black letter) is searched for so as to determine lines, and the document image is divided into lines. Then, the document image is projected onto a horizontal coordinate axis in units of lines, blank part is searched for, and each line is divided into a letter unit. Accordingly, each letter can be recognized in a circumscribed rectangle.
  • the watermark information embedding unit 207 embeds the digital-watermark information in the document image (step S 304 ). Accordingly, a water-marked image 210 is generated (step S 305 ).
  • FIG. 4 is a flowchart for explaining the process.
  • the digital-watermark information 204 to be embedded in the document image is input (step S 401 ).
  • a first letter to which the digital-watermark information 204 is to be embedded is selected in the document image (step S 402 ).
  • step S 403 it is determined whether or not the bit of the digital-watermark information to be embedded is 1 (step S 403 ). If the bit is 1 (YES in the flowchart), the letter is inclined in a clockwise direction (step S 404 ). On the other hand, if the bit is 0 (NO in the flowchart), the letter is inclined in a counterclockwise direction (step S 405 ).
  • 1-bit information is embedded in a letter by determining a clockwise turn or a counterclockwise turn.
  • an absolute value of the inclination angle may be divided into a plurality of levels and different pieces of embedding information may be allocated to these levels. Specifically, it is regarded that 0 (counterclockwise) or 1 (clockwise) is embedded. Further, a threshold value is set in increments of 2 degrees from 2 to 20 degrees of the inclination angle, and it is regarded that the bit of embedded watermark information is increased by 1 bit as the inclination angle increases by 2 degrees. In this case, 1 to 10 bits may be embedded in a letter.
  • step S 406 it is determined whether or not the letter which is being processed is the last letter of the document. If the letter is the last letter (YES in the flowchart), the process of embedding digital-watermark information is completed. On the other hand, if the letter is not the last letter (NO in the flowchart), the process returns to step S 402 so as to select a next letter.
  • the water-marked image 210 is output from the image output unit 209 (step S 306 ).
  • output means printing of the image or storing the image data in a storage device or the like.
  • the image data may be transmitted to another terminal through a network or the like.
  • two other parameters which determine robustness to attack correspond to the rotation range of a letter and the repetition number of embedding desired digital-watermark information in a document image.
  • the repetition number is the number of times a piece of digital-watermark information is embedded in a document image.
  • embedding strength is defined to be proportional to f(n), which is obtained by normalizing the repetition number n of embedding.
  • image quality is defined to be inversely proportional to g( ⁇ ), which is obtained by normalizing the rotation range ⁇ of a letter.
  • the repetition number n is at least 3. That is, when a piece of digital-watermark information is embedded in a document image less than three times, it is determined that the entire digital-watermark information has not been embedded. This is the minimum number for reliably extracting digital-watermark information.
  • a maximum value of the rotation range of a letter is set so as to prevent unnatural appearance thereof, for example, is set to 20 degrees.
  • a physical minimum value of the repetition number is 1, and a physical maximum value of the rotation range of a letter is 180 degrees. These values may be naturally applied.
  • FIG. 5 is a flowchart showing a process performed when the robustness-priority forced embedding mode is selected.
  • the process shown in FIG. 5 corresponds to a step of embedding digital-watermark information, that is, S 304 in FIG. 3.
  • step S 304 - 1 a desired embedding strength is specified and is input to the device. Then, in step S 304 - 1 b , the repetition number and the rotation range are set to the initial values based on the embedding strength. Then, in step S 304 - 1 c , all letters to be processed in the document image 200 are rotated in order so as to embed the digital-watermark information therein. After the digital-watermark information has been embedded in all the letters, the process proceeds to step S 304 - 1 d.
  • step S 304 - 1 d it is checked whether or not the entire desired digital-watermark information 204 has been embedded in the document image 200 . If the entire information has not been embedded (NO in the flowchart), the process proceeds to step S 304 - 1 e in order to embed the entire information in the document image.
  • step S 304 - 1 e it is determined whether or not the rotation range of a letter has reached a threshold value. If the rotation range has not reached the threshold value (NO in the flowchart), the process proceeds to step S 304 - 1 f.
  • step S 304 - 1 f since a high priority is given to robustness to attack in this mode, the rotation range of a letter is increased so as to degrade the image quality. Then, digital-watermark information is embedded again based on the newly set parameters (repetition number and rotation range). The above-described steps are repeatedly performed so as to embed the entire desired digital-watermark information.
  • FIG. 6 shows the change in f(n) and g( ⁇ ). Arrows in the figure indicate a state where the parameters of the repetition number (f) and the rotation range (g) change to an unfavorable state. That is, in FIG. 6, the arrow of the repetition number (f) indicates decrease, and the robustness to attack reduces in accordance with the decrease. On the other hand, the arrow of the rotation range (g) indicates increase, and the quality of the water-marked image is degraded in accordance with the increase.
  • Steps S 304 - 1 e and S 304 - 1 f correspond to stage ( 1 ) in FIG. 6. In stage ( 1 ), further degradation of the image quality (increase in rotation range) is allowed.
  • step S 304 - 1 e if the rotation range has reached Threshold 1 or Threshold 2 (YES in step S 304 - 1 e ), a step of increasing the rotation range is stopped so as to try to decrease the repetition number.
  • step S 304 - 1 g it is determined whether or not the repetition number has reached the threshold value. If the repetition number has not reached the threshold value (NO in the flowchart), the process proceeds to step S 304 - 1 h , where the repetition number is decreased so as to increase the amount of information which can be embedded.
  • the change in the parameter (repetition number) at this time corresponds to stage ( 2 ) in FIG. 6.
  • step S 304 - 1 g if the repetition number has reached the threshold value (YES in the flowchart), the process proceeds to step S 304 - 1 i , where it is determined whether or not the rotation range has reached the maximum. If the rotation range has not reached the maximum (NO in the flowchart), the process proceeds to step S 304 - 1 j , where the rotation range is increased again.
  • the change in the parameter (rotation range) at this time corresponds to stage ( 3 ) in FIG. 6. In stage ( 3 ), the level of degradation of image quality is over Threshold 1, and thus the threshold value is changed so as to embed the entire digital-watermark information correctly.
  • step S 304 - 1 i if the rotation range has reached the maximum of 180 degrees (YES in the flowchart), the process proceeds to step S 304 - 1 k , where it is determined whether or not the repetition number has reached the minimum of 1. If the repetition number has not reached the minimum (NO in the flowchart), the process proceeds to step S 304 - 1 l , where the repetition number is reduced again. The change in the parameter (repetition number) at this time corresponds to stage ( 4 ) in FIG. 6. On the other hand, if the repetition number has reached the minimum (YES in the flowchart), the process of embedding the digital-watermark information cannot be continued any more (correct information cannot be embedded). Thus, the process proceeds to step S 304 - 1 m , where it is determined that embedding ended in failure, so as to stop the embedding process.
  • FIG. 7 is a flowchart showing a process performed when the image-quality-priority forced embedding mode is selected.
  • step S 304 - 2 a desired embedding strength is specified and is input to the device. Then, in step S 304 - 2 b , the repetition number and the rotation range are set to the initial values based on the embedding strength. Then, in step S 304 - 2 c , all letters to be processed in the document image 200 are rotated in order so as to embed the digital-watermark information therein. After digital-watermark information has been embedded in all the letters, the process proceeds to step S 304 - 2 d.
  • step S 304 - 2 d it is checked whether or not the entire desired digital-watermark information 204 has been embedded in the document image 200 . If the entire information has not been embedded (NO in the flowchart), the process proceeds to step S 304 - 2 e in order to embed the entire information in the document image. Then, a process of correctly embedding the digital-watermark information is performed in accordance with the following steps.
  • FIG. 8 shows the change in f(n) and g( ⁇ ) in the image-quality-priority forced embedding mode. Arrows in the figure indicate a state where the parameters of the repetition number (f) and the rotation range (g) changes to an unfavorable state.
  • the system of FIG. 8 is the same as that of FIG. 6, and thus a detailed description is omitted.
  • step S 304 - 2 e it is determined whether or not the repetition number has reached the threshold value. If the repetition number has not reached the threshold value (NO in the flowchart), the process proceeds to step S 304 - 2 f , where the repetition number is reduced.
  • the change in the parameter (repetition number) at this time corresponds to stage ( 1 ) in FIG. 8.
  • step S 304 - 2 e if the repetition number has reached the threshold value (YES in the flowchart), a step of decreasing the repetition number is suspended.
  • step S 304 - 2 g it is determined whether or not the rotation range has reached the threshold value. If the rotation range has not reached the threshold value (NO in the flowchart), the process proceeds to step S 304 - 2 h , where the rotation range is increased so as to increase the amount of digital-watermark information which can be embedded.
  • the change in the parameter (rotation range) at this time corresponds to stage ( 2 ) in FIG. 8.
  • step S 304 - 2 i it is determined whether or not the repetition number has reached the minimum. If the repetition number has not reached the minimum (NO in the flowchart), the process proceeds to step S 304 - 2 j , where the repetition number is decreased again so as to try to increase the amount of digital-watermark information which can be embedded.
  • the change in the parameter (repetition number) at this time corresponds to stage ( 3 ) in FIG. 8.
  • step S 304 - 2 i if the repetition number has reached the minimum (YES in the flowchart), the process proceeds to step S 304 - 2 k , where it is determined whether or not the rotation range has reached the maximum. If the rotation range has not reached the maximum (NO in the flowchart), the process proceeds to step S 304 - 2 l , where the rotation range is increased so as to try to increase the amount of digital-watermark information which can be embedded. The change in the parameter at this time corresponds to stage ( 4 ) in FIG. 8.
  • step S 304 - 2 k if the rotation range has reached the maximum (YES in the flowchart), the process of embedding the digital-watermark information cannot be continued any more (correct information cannot be embedded). Thus, the process proceeds to step S 304 - 2 m , where it is determined that embedding ended in failure, so as to stop the embedding process.
  • the parameter group is changed in the following order: degrade image quality to a first threshold (1), reduce robustness to a first threshold (2), degrade image quality to a second threshold (3), reduce robustness to a second threshold (4), degrade image quality to a third threshold (5), reduce robustness to a third threshold (6),
  • the parameter group is changed in the following order: reduce robustness to a first threshold (1), degrade image quality to a first threshold (2), reduce robustness to a second threshold (3), degrade image quality to a second threshold (4), reduce robustness to a third threshold (5), degrade image quality to a third threshold (6) . . . .
  • the repetition number is regarded as a first parameter determining robustness to attack.
  • another value may be regarded as the first parameter determining robustness to attack.
  • information to be embedded is encoded with an error-correction code in a process of embedding digital-watermark information by changing the inclination angle of a letter.
  • error-correction ability in the error-correction encoding is regarded as the first parameter determining the robustness to attack.
  • the second parameter determining image quality is the rotation range, as in the first embodiment.
  • the repetition number is regarded as the first parameter for clarity.
  • robustness to attack does not always depend only on a single parameter.
  • robustness to attack may also depend on error-correction ability and rotation range of a letter. Therefore, various factors may be regarded as a parameter which determines degradation of each of robustness to attack and image quality.
  • embedding strength (robustness to attack) is represented by multiplying f(t) obtained by normalizing error-correction ability t by g( ⁇ ) obtained by normalizing the rotation range ⁇ . That is, the following equation is obtained:
  • t and ⁇ are set to values so that the Strength can be obtained.
  • a threshold value defining the tolerance of error-correction ability is set to 1, and a physical limit is set to 0.
  • the rotation range of a letter is the same as in the first embodiment.
  • FIG. 9 is a flowchart for explaining an embedding process performed when the robustness-priority forced embedding mode is selected.
  • the step of changing the repetition number in FIG. 5 is replaced by a step of changing the error-correction ability of an error-correction code, and the above-described embedding strength is applied.
  • Steps S 304 - 3 a to S 304 - 3 d are the same as in FIGS. 5 and 7.
  • step S 304 - 3 e it is determined whether or not the error-correction ability t is more than 0. If the error-correction ability t is more than 0 (YES in the flowchart), the process proceeds to step S 304 - 3 f , where the error-correction ability is reduced and the code length obtained after error-correction encoding is reduced, so as to increase the amount of digital-watermark information which can be embedded.
  • step S 304 - 3 i it is determined whether or not the rotation range has reached the threshold value. If the rotation range has not reached the threshold value (NO in the flowchart), the process returns to step S 304 - 3 c , where digital-watermark information is embedded again based on a newly set parameter. Then, the above-described steps are repeatedly performed so as to correctly embed the entire digital-watermark information. If the rotation range has reached the threshold value (YES in the flowchart), the process proceeds to step S 304 - 3 l.
  • FIG. 10 shows the change in the error-correction ability (f) and the rotation range (g). Arrows in the figure indicate a state where the parameters of the error-correction ability (f) and the rotation range (g) change to an unfavorable state.
  • the system of FIG. 10 is the same as that of FIG. 6.
  • a feature in FIG. 10 is that, in a first stage ( 1 ) of adjusting the parameters, the parameters (f and g) are changed so that the robustness (strength) to attack is kept constant.
  • the parameter g is continuously increased in the transition from stage ( 2 ) to stage ( 3 ).
  • step S 304 - 3 d it is checked whether or not the entire desired digital-watermark information 204 has been embedded in the document image 200 . If the entire information has not been embedded (NO in the flowchart), the process proceeds to step S 304 - 3 e so as to embed the entire digital-watermark information in the document image in accordance with the following steps.
  • step S 304 - 3 e if the error-correction ability has reached the threshold value (NO in the flowchart), the process of reducing the error-correction ability of the error-correction code is stopped and the process proceeds to step S 304 - 3 j .
  • step S 304 - 3 j it is determined whether or not the rotation range has reached the threshold value.
  • step S 304 - 3 j if the rotation range has not reached the threshold value (NO in the flowchart), the process proceeds to step S 304 - 3 k , where the tolerance of rotation range is increased so as to increase the amount of digital-watermark information which can be embedded.
  • the change in the parameter (rotation range) at this time corresponds to stage ( 2 ) in FIG. 10.
  • step S 304 - 3 j if the tolerance of rotation range has reached the threshold value, the process proceeds to step S 304 - 3 l .
  • step S 304 - 3 l it is determined whether or not the rotation range has reached the maximum. If the rotation range has reached the maximum, the process proceeds to step S 304 - 3 m , where the tolerance of rotation range is increased so as to increase the amount of digital-watermark information which can be embedded.
  • the change in the parameter (rotation range) at his time corresponds to stage ( 3 ) in FIG. 10.
  • the letters included in the document image to which digital-watermark information is embedded is included in a page.
  • the document image often includes a plurality of pages.
  • digital-watermark information is embedded in a plurality of pages, in addition to the processes of reducing the repetition number and the error-correction ability.
  • FIGS. 12 and 13 show the operations of the third embodiment.
  • a step of setting a page to which digital-watermark information is embedded to a next page is performed when it is determined that the repetition number has reached the minimum (step S 304 - 1 k in FIG. 5) in the embedding process of the first embodiment.
  • FIG. 12 shows a process of the robustness-priority forced embedding mode as in FIG. 5, and the process shown in FIG. 12 is the same as that in FIG. 5, except that a next page may exist in FIG. 12.
  • FIG. 13 shows a process of the image-quality-priority forced embedding mode as in FIG. 7, and the process shown in FIG. 13 is the same as that in FIG. 7, except that a next page may exist in FIG. 13.
  • both processes are described briefly.
  • step S 304 - 5 k in FIG. 12 it is determined whether or not the repetition number has reached the minimum. If the repetition number has reached the minimum (YES in the flowchart), the process proceeds to step S 304 - 5 m , where it is determined whether or not the page which is being processed is the last page. If a next page exist (NO in the flowchart), the process proceeds to step S 304 - 5 o , where the page to which digital-watermark information is to be embedded is changed to the next page. Then, the step of embedding digital-watermark information is performed again. If a next page does not exist (YES in the flowchart), the process of embedding digital-watermark information is ended in failure (step S 304 - 5 n ).
  • step S 304 - 6 k in FIG. 13 it is determined whether or not the rotation range has reached the maximum. If the rotation range has reached the maximum (YES in the flowchart), the process proceeds to step S 304 - 6 m , where it is determined whether or not the page which is being processed is the last page. If a next page exist (NO in the flowchart), the process proceeds to step S 304 - 6 o , where the page to which digital-watermark information is to be embedded is changed to the next page. Then, the step of embedding digital-watermark information is performed again. If a next page does not exist (YES in the flowchart) in step S 304 - 6 m , the process of embedding digital-watermark information is ended in failure (step S 304 - 6 n ).
  • a problem of a document image that is, the number of letters in which digital-watermark information is to be embedded is limited, can be solved by forming the document image with a plurality of pages.
  • the embedding strength (robustness to attack) in the first embodiment can be associated with each parameter, as in the second embodiment.
  • the error-correction ability t in the equations (1) and (2) in the second embodiment is replaced by the repetition number n.
  • the embedding strength in the second embodiment depends only on f, which is obtained by normalizing the repetition number n, as in the first embodiment.
  • digital-watermark information is embedded by rotating a letter, but another method may be used.
  • digital-watermark information may be embedded by changing a space between letters.
  • this embedding method will be described.
  • FIG. 14 shows part of a document image which has not been water-marked.
  • FIG. 15 shows part of a document image obtained by water-marking the document image shown in FIG. 14.
  • P 0 , S 0 , P 1 , and S 1 are values indicating the lengths of spaces between the letters.
  • P 0 , S 0 , P 1 , and S 1 in FIG. 14 are adjusted based on a predetermined rule in order to embed digital-watermark information, so as to be P 0 ′, S 0 ′, P 1 ′, and S 1 ′ in FIG. 15.
  • FIGS. 14 and 15 five letters and four spaces are provided.
  • two space-lengths P n and S n are used for embedding 1-bit digital-watermark information.
  • 2-bit digital-watermark information can be embedded by using four spaces P 0 , S 0 , P 1 , and S 1 .
  • P n >S n indicates 1 and P n ⁇ S n indicates 0.
  • movement amount x of a letter is used instead of the rotation amount ⁇ of a letter in the first to third embodiments.
  • the first parameter corresponds to the repetition number or the error-correction ability as in the first to third embodiments
  • the second parameter corresponds to the movement range of each letter.
  • FIG. 16 shows the configuration of a digital-watermark embedding device according to a fifth embodiment
  • FIG. 17 shows the operation of the device shown in FIG. 16.
  • the function and operation of each unit of this embodiment will be described with reference to FIGS. 16 and 17.
  • a document image (original image 1100 ) in which digital-watermark information is to be embedded is read through an image input unit 1101 and is input to a region-segmentation unit 1102 (step S 1301 ).
  • the region-segmentation unit 1102 segments the input document image into a plurality of attribute regions: a text region, a figure region, a graphic region, a table region, and so on (step S 1302 ).
  • a circumscribed rectangle extracting unit 1103 extracts circumscribed rectangles of the letters included in the text region (step S 1303 ).
  • a circumscribed rectangle of a letter is a rectangle circumscribing a letter, and is generally known as a region for recognizing a letter. In this embodiment, however, the circumscribed rectangle is used as a minimum unit to be operated for embedding digital-watermark information. A method of extracting the circumscribed rectangle has been described above.
  • FIG. 18 shows a process of embedding digital-watermark information by changing the inclination angle of a letter.
  • digital-watermark information to be embedded is input (step S 1401 ).
  • the first letter in which digital-watermark information is embedded is selected (step S 1402 ).
  • it is determined whether or not the bit of the digital-watermark information to be embedded is 1 (step S 1403 ). If the bit is 1 (YES in the flowchart), the letter is inclined in a clockwise direction (step S 1404 ).
  • the letter is inclined in a counterclockwise direction (step S 1405 ).
  • the embedding information can be increased in accordance with the absolute value of the inclination angle. For example, 0 or 1 is determined according to counterclockwise or clockwise. In this case, a threshold value is set in increments of 2 degrees from 2 to 20 degrees of the inclination angle, and 10 bits may be embedded in a letter.
  • the above description is basically the same as in the first embodiment.
  • step S 1406 it is determined whether or not the letter is the last letter of the document. If the letter is the last letter (YES in the flowchart), the process of embedding digital-watermark information is completed. On the other hand, if the letter is not the last letter (NO in the flowchart), the process returns to step S 1402 so as to select a next letter.
  • the water-marked image is output from the image output unit 1110 (step S 1306 ).
  • the output image may be printed out or may be stored in a storage device or the like in the form of image data. Alternatively, the image data may be transmitted to another terminal through a network or the like.
  • embedding strength is indicated by an integer from 1 to 10 for user's intuitive understanding. This range may be changed, and continuous values may be used instead of discrete values.
  • FIG. 19 is a flowchart for explaining an embedding process performed by using the embedding capacity checking unit 1104 and the image-quality/robustness parameters control unit 1109 .
  • embedding strength 1106 an embedding mode 1107 , and digital-watermark information 1105 are input (step S 304 - 1 a ).
  • the number of letters in the image 1100 , in which the digital-watermark information is to be embedded is counted, so as to obtain basic data for calculating the capacity for embedding (step S 304 - 1 b ).
  • the minimum of the repetition number is set to 3, for example. This is the minimum number for absorbing instability at extraction of watermark information.
  • the maximum of repetition number is set so that the amount of information which can be embedded does not become 0.
  • the repetition number which is an embedding parameter
  • the image-quality parameter is fixed.
  • embedding capacity can be obtained by dividing the number of letters by the repetition number.
  • the embedding capacity is further reduced when header information is stored.
  • the repetition number is sequentially increased so as to calculate corresponding embedding capacity.
  • FIG. 20 shows the combinations of values for obtaining each embedding capacity. In FIG. 20, when the repetition number is 3, the embedding capacity is 200.
  • the calculated values are associated with embedding strength (step S 304 - 1 d ).
  • the embedding strength is fixed to 10 levels, and thus the parameters and the embedding capacity must be thinned out.
  • the embedding capacity when the repetition number is an even number is associated with each strength.
  • FIG. 20 shows embedding capacity labeled with l 1 to l 10 , which is associated with embedding strength so as to present to the user.
  • the corresponding image-quality parameters are constant, but they are labeled with q 1 to q 10 for generality.
  • the corresponding repetition numbers are also labeled with n 1 to n 10 .
  • FIG. 21 shows groups of values which are associated with embedding strength.
  • step S 304 - 1 d it is determined whether or not the embedding capacity obtained based on the embedding strength input by the user is larger than the digital-watermark information to be embedded (step S 304 - 1 e ). If the embedding capacity is larger than the digital-watermark information (YES in the flowchart), the embedding process is continued (step S 304 - 1 k ). At this time, the repetition number of embedding is maximized within the range of capacity for storing the digital-watermark information to be embedded.
  • the user inputs digital-watermark information having embedding strength of 6 and length of 12.
  • embedding capacity corresponding to embedding strength 6 is 18.
  • the repetition number can be increased to 15, which corresponds to embedding capacity of 13. That is, robustness can be increased to embedding strength of 7.
  • step S 304 - 1 e determines whether or not the input embedding mode is the robustness-priority forced embedding mode. If the result is YES, the image-quality parameter is decreased (step S 304 - 1 g ), so as to perform the embedding step (step S 304 - 1 k ).
  • step S 304 - 1 f when the result of step S 304 - 1 f is NO, it is determined whether or not the input embedding mode is the image-quality-priority forced embedding mode (S 304 - 1 h ). If the result is YES, the robustness parameter is decreased (step S 304 - 1 i ), so as to perform the embedding step (step S 304 - 1 k ). On the other hand, if the result is NO, the mode is the normal mode. In this case, embedding failure is notified to the user (step S 304 - 1 j ), so as to end the process.
  • FIG. 22 is a flowchart for explaining the operation of the digital-watermark embedding device according to the sixth embodiment.
  • a step of obtaining basic data for calculating embedding capacity (step S 304 - 2 a ), a step of calculating embedding capacity (step S 304 - 2 b ), and a step of associating parameters with embedding strength (step S 304 - 2 c ) are the same as in the fifth embodiment. Then, a list of obtained embedding strength and corresponding embedding capacity is presented to the user (step S 304 - 2 d ).
  • the user refers to the presented information so as to know constraint of embedding strength for obtaining desired embedding strength.
  • the user inputs embedding strength, information to be embedded, and an embedding mode for specifying the extent to which embedding parameters can be changed (step S 304 - 2 e ).
  • the following steps are the same as in the fifth embodiment.
  • digital-watermark information is embedded by rotating a letter.
  • the digital-watermark information can also be embedded by changing the space (length) between letters, as in the fourth embodiment. This method has been described above, and thus is not described here.
  • step S 304 - 2 b in FIG. 22 the data is not a simple number of letters, but 1 ⁇ 2 of the number of spaces between letters.
  • the method for calculating the other values is the same as the above.
  • FIG. 23 shows an electrical configuration of the digital-watermark embedding device of the present invention. In order to realize the digital-watermark embedding device, all the functions shown in FIG. 23 are not necessarily required.
  • a computer 1401 is a generally-used personal computer.
  • An image is read by an image input device 1417 , such as a scanner, and is input to the computer 1401 , where the image may be edited and stored therein. Also, the image obtained through the image input device 1417 can be printed by a printer 1416 . Instructions from the user are input through a mouse 1413 or a keyboard 1414 .
  • an MPU 1402 controls the operations of the blocks in the computer 1401 and executes a stored program.
  • a main memory 1403 is used for temporarily storing a program or image data to be processed, for the process executed by the MPU 1402 .
  • a hard disk drive (HDD) 1404 can store a program and image data to be transferred to the main memory 1403 and so on and can store processed image data.
  • a scanner interface (I/F) 1415 is connected to the scanner 1417 , which scans a document or a film so as to generate image data, and the image data obtained by the scanner 1417 can be input through the scanner interface 1415 .
  • a printer interface 1408 is connected to the printer 1416 , which prints image data, and transmits the image data to be printed to the printer 1416 .
  • a CD drive 1409 reads data stored in a CD (CD-R/CD-RW) into the computer, the CD being an external storage medium, and writes out the data.
  • An FD drive 1411 reads data stored in an FD into the computer and writes out the data, as the CD drive 1409 .
  • a DVD drive 1410 reads data stored in a DVD into the computer and writes out the data, as the FD drive 1411 .
  • An interface (I/F) 1412 is connected to the mouse 1413 and the keyboard 1414 so as to receive input instructions therefrom.
  • a monitor 1406 is a display device for displaying a result of extracting process and processing of digital-watermark information.
  • a video controller 1405 is used for transmitting display data to the monitor 1406 .
  • the present invention may be applied to a system including a plurality of devices (for example, host computer, interface device, reader, and printer) or may be applied to a single device (for example, copying machine or fax machine).
  • a plurality of devices for example, host computer, interface device, reader, and printer
  • a single device for example, copying machine or fax machine
  • the object of the present invention can be achieved by supplying a recording medium (or storage medium) containing program code of software for realizing the function of the above-described embodiments to a system or device so that the program code stored in the recording medium is read and executed by the computer (or CPU or MPU) in the system or device.
  • the program code itself read from the recording medium realizes the function of the above-described embodiments. Therefore, the recording medium containing the program code is included in the present invention.
  • the functions of the above-described embodiments may be realized by executing the program code read by the computer.
  • an operating system (OS) working in the computer may execute part or whole of actual processing based on the instructions of the program code, so that the functions of the above-described embodiments are realized by the processing.
  • OS operating system
  • the program code read from the recording medium may be written in a memory provided in an expansions card inserted into the computer or an expansions unit connected to the computer and a CPU provided in the expansions card or the expansions unit may execute part or whole of actual processing based on the instructions of the program code, so that the functions of the above-described embodiments are realized by the processing.
  • an error state in which digital-watermark information cannot be embedded can be suppressed. That is, digital-watermark information can be embedded forcedly.
  • various parameters can be efficiently adjusted in accordance with a desired priority. Specifically, when a high priority is given to image quality, various parameters can be changed stepwise while the image quality can be maintained. On the other hand, when a high priority is given to robustness to attack (embedding strength), various parameters can be changed stepwise while the robustness can be maintained.
  • the priority can be set before operation, or when it is determined that the entire digital-watermark information cannot be embedded correctly in an image. That is, the priority should be set before deciding the most important parameter so as to change parameter group.
  • a user can recognize the relationship between the amount of information which can be embedded and embedding strength when digital-watermark information is embedded in a document image.

Abstract

An object of the present invention is to efficiently embed digital-watermark information in a document image by adjusting robustness and quality of the image. In order to achieve the object, watermark information and image information are input, a first parameter determining embedding strength and a second parameter determining image quality are set, and the digital-watermark information is embedded in the image based on the first and second parameters. When the entire information cannot be embedded, the first or second parameter is adjusted so as to embed a larger amount of digital-watermark information in the image.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0001]
  • The present invention relates to a technique for embedding digital-watermark information in an image. [0002]
  • 2. Description of the Related Art [0003]
  • In recent years, digital data, such as text data, image data, and voice data, has been widely used, and it has become necessary to prevent unauthorized duplication of the data. Also, documents and images are often used in a printed form, and thus unauthorized duplication of the printed material must be prevented. [0004]
  • Digital-watermark embedding has been known as a technique for preventing unauthorized duplication. In this technique, original digital image data is modulated so that the data is imperceptible or difficult to perceive, and another piece of information is embedded in the data. [0005]
  • When digital-watermark information is embedded, it is very important to determine whether or not necessary amount of information can be embedded in original image data. [0006]
  • The following three elements are in tradeoff relationship: (1) quality of image data in which digital-watermark information is embedded; (2) robustness to attack (image editing and so forth) on the image data; and (3) the amount of digital-watermark information to be embedded in the original image data. [0007]
  • For example, if degradation of image quality caused by digital-watermark embedding is suppressed, robustness to attack is reduced or the amount of information to be embedded is reduced. If the amount of information to be embedded is increased, degradation of image quality caused by digital-watermark embedding becomes significant or robustness to attack is reduced. If robustness to attack is increased, degradation of image quality caused by digital-watermark embedding becomes significant or the amount of information to be embedded is reduced. The robustness to attack is referred to also as embedding strength. [0008]
  • As a technique for embedding digital-watermark information in a multivalued image, a method using redundancy of pixel density has been known. Also, as a technique for embedding digital-watermark information in a binary document image, a digital-watermark embedding method using the characteristic of the document image has been known. For example, Japanese Patent Laid-Open No. 9-186603 (U.S. Pat. No. 5,861,619) discloses a method for embedding digital-watermark information by changing the length of space between words. In such a method, digital-watermark information is represented by changing the length of space between words or letters, and 1-bit information (1 or 0) is allocated in accordance with the length of two spaces. [0009]
  • Also, “Digital Watermarking onto Japanese Documents by Seal Image”, written by Yasuhiro NAKAMURA and Kineo MATSUI (Information Processing Society of Japan Journal Vol. 38, No. 11, November 1997), discloses a technique of embedding digital-watermark information by rotating letters so as to change the inclination angle of the letters. [0010]
  • FIG. 24 shows an example of the above-described known art. For example, when a letter is rotated clockwise, “1” is embedded therein as shown in ([0011] 1) in FIG. 24. When a letter is rotated counterclockwise, “0” is embedded therein as shown in (2) in FIG. 24. Watermark may be embedded in sequential letters, or every few letters, or in a letter at a predetermined position. In FIG. 24, the letter “C” is rotated clockwise and the letter “E” is rotated counterclockwise. Accordingly, information “10” is embedded in this case.
  • Now, a method for embedding digital-watermark information in a multivalued image will be described. Hereinafter, image data represents a monochrome multivalued image for clarity. [0012]
  • A binary data sequence is regarded as additional information Inf. The additional information Inf is information including some bits, each bit representing “0” or “1”. Then, digital-watermark information w is generated based on the additional information Inf. In the simplest method of generating the digital-watermark information w, an image is scanned by raster scanning and the additional information Inf is associated with the position of image data I. When a bit represents “0”, −1 is allocated, and when a bit represents “1”, +1 is allocated. [0013]
  • Then, the image data I and the digital-watermark information w are input, the digital-watermark information w is embedded in the image data I, and then image data I′ in which the digital-watermark information w is embedded is output. [0014]
  • For example, digital-watermark information embedding is performed in accordance with an equation: I′[0015] i,j=Ii,j(1+awi,j). Herein, I′i,j is image data in which digital-watermark information is embedded, Ii,j is image data before the digital-watermark information is embedded therein, wi,j is the digital-watermark information, i and j are parameters representing x and y coordinates of I and I′ and w, respectively, and a is a parameter specifying the embedding strength of the digital-watermark.
  • Now, the strength a will be described. For example, when the strength a is “0.01”, it means that about 1% of the element value of an original image is changed. By increasing the value of a, digital-watermark information which is robust to attack can be embedded. In that case, however, quality of the image is significantly degraded. On the other hand, by decreasing the value of a, the robustness to attack will be reduced. In that case, however, degradation of the image quality can be suppressed. [0016]
  • That is, by adequately setting the value of a, robustness to attack and the quality of water-marked image can be kept in balance. When digital-watermark information is embedded in a multivalued image, the amount of information which can be embedded therein is effectively specified based on the size of the original image. [0017]
  • On the other hand, when digital-watermark information is embedded in a document image, the amount of information which can be embedded is generally proportional to the number of letters. The documents may include newspapers, presentation material, and postcards, and the number of letters included in these documents is different from each other. Therefore, when digital-watermark information is embedded in a document image, it is difficult and is not preferable to estimate the amount of information which can be embedded therein in advance. [0018]
  • However, an efficient method of embedding digital-watermark information in a document image considering the above-described three elements has not been known. Also, an efficient method of embedding digital-watermark information in a multivalued image considering the above-described three elements has not been established. [0019]
  • SUMMARY OF THE INVENTION
  • The present invention has been made in view of the above-described problems, and it is a major object of the present invention to efficiently embedding digital-watermark information in an image by considering the above-described three elements. In particular, it is an object of the present invention to provide an effective technique of embedding digital-watermark information in a document image. [0020]
  • In order to achieve the above-described objects, a digital-watermark embedding method of the present invention comprises: a generating step of generating digital-watermark information; an input step of inputting an image; a setting step of setting a first parameter determining robustness to attack on the digital-watermark information embedded in the image and a second parameter determining quality of the image in which the digital-watermark information is embedded; an embedding step of embedding the digital-watermark information in the input image by using the first and second parameters; a determination step of determining whether or not the entire digital-watermark information can be embedded in the image; an update step of updating one of the parameters so as to embed a larger amount of digital-watermark information in the image when it is determined that the entire digital-watermark information cannot be embedded in the determination step, the update step being performed as a first stage; and an embedding step of embedding the digital-watermark information in the input image again by using the updated parameter. The determination step is performed for each of the embedding steps. [0021]
  • Further objects, features, and advantages of the present invention will become apparent from the following description of the preferred embodiments with reference to the attached drawings.[0022]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 shows a basic configuration of a digital-watermark embedding device. [0023]
  • FIG. 2 shows the configuration of a digital-watermark embedding device of a first embodiment. [0024]
  • FIG. 3 is a flowchart of an operation of the digital-watermark embedding device shown in FIG. 2. [0025]
  • FIG. 4 is a flowchart showing a method of embedding digital-watermark by changing the inclination angle of a letter. [0026]
  • FIG. 5 is a flowchart showing a process in a robustness-priority forced embedding mode. [0027]
  • FIG. 6 shows a state of change in f(n) and g(δθ). [0028]
  • FIG. 7 is a flowchart showing a process in an image-quality-priority forced embedding mode. [0029]
  • FIG. 8 shows change in parameters in the image-quality-priority forced embedding mode. [0030]
  • FIG. 9 is a flowchart showing a process in the robustness-priority forced embedding mode. [0031]
  • FIG. 10 shows a state of change in f and g. [0032]
  • FIG. 11 is a flowchart showing a process in the image-quality-priority forced embedding mode. [0033]
  • FIG. 12 is a flowchart showing an operation of a digital-watermark embedding device having a function of changing pages of document image in which digital-watermark information is to be embedded. [0034]
  • FIG. 13 is a flowchart showing an operation of the digital-watermark embedding device having a function of changing pages of document image in which digital-watermark information is embedded. [0035]
  • FIG. 14 shows part of document image before digital-watermark information is embedded therein. [0036]
  • FIG. 15 shows part of document image after digital-watermark information is embedded therein. [0037]
  • FIG. 16 shows the configuration of a digital-watermark embedding device according to a fifth embodiment. [0038]
  • FIG. 17 is a flowchart of an operation of the digital-watermark embedding device shown in FIG. 16. [0039]
  • FIG. 18 is a flowchart showing a method of embedding digital-watermark by changing the inclination angle of a letter. [0040]
  • FIG. 19 is a flowchart of an embedding process performed by using an embedding capacity checking unit and an image-quality/robustness parameters control unit. [0041]
  • FIG. 20 shows combinations of values for obtaining each embedding capacity. [0042]
  • FIG. 21 shows combinations of values corresponding to each embedding strength. [0043]
  • FIG. 22 is a flowchart showing an operation of a digital-watermark embedding device according to a sixth embodiment. [0044]
  • FIG. 23 shows the internal configuration of the digital-watermark embedding device. [0045]
  • FIG. 24 shows an example of a known technique for embedding digital-watermark.[0046]
  • DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • Hereinafter, preferred embodiments of the present invention will be described in order. [0047]
  • First, a digital-watermark embedding device which can be applied to the embodiments of the present invention will be described with reference to the drawings. [0048]
  • FIG. 1 shows a basic configuration of the digital-watermark embedding device which can be applied to the embodiments of the present invention. [0049]
  • As shown in FIG. 1, the digital-watermark embedding device basically includes an [0050] image input unit 101; a watermark information embedding unit 102; an image-quality/robustness parameters control unit 106; and an image output unit 107.
  • As shown in FIG. 1, an image (original image [0051] 100) to which digital-watermark information 103 is to be embedded is input to the image input unit 101 (for example, a scanner 1417 in FIG. 23, described later). Also, the digital-watermark information 103, embedding strength 104, and an embedding mode 105 are input to the watermark information embedding unit 102. Then, the watermark information embedding unit 102 embeds the digital-watermark information in the original image 100 by using the input digital-watermark information 103, the embedding strength 104, and the embedding mode 105. Accordingly, a water-marked image 108 is generated. The water-marked image 108 is output from the image output unit 107 (for example, a printer 1416 in FIG. 23, described later).
  • Herein, a normal mode and two types of forced embedding modes are provided as the embedding [0052] mode 105. Also, an initial value of a parameter group for deciding robustness/image-quality degradation is set based on specified embedding strength 104. Hereinafter, the outline of each mode will be described.
  • In the normal mode, digital-watermark information is embedded by using the set initial value. However, when the amount of information which can be embedded is limited, the embedding is aborted. [0053]
  • On the other hand, in the forced embedding mode, a desired amount of digital-watermark information is forcedly embedded. The forced embedding mode includes two types of modes: a robustness-priority forced embedding mode and an image-quality-priority forced embedding mode. [0054]
  • The robustness-priority forced embedding mode is used for generating the water-marked [0055] image 108 which is robust to future possible attacks, such as image editing. Therefore, in this mode, the parameter group is changed so that the robustness to attack can be maintained while the image quality is degraded.
  • However, when the desired amount of digital-watermark information cannot be embedded by changing the parameter group in the above-described manner, the parameter group is changed again so as to also reduce the robustness to attack. In order to perform the determination, a threshold value for defining the tolerance of degradation of each of robustness to attack and image quality is set in advance. [0056]
  • If both of robustness to attack and image quality are out of the degradation tolerance, it is determined that the tolerance is too small to embed the desired amount of information. [0057]
  • However, in the forced embedding mode, the desired amount of digital-watermark information must be forcedly embedded. Therefore, when both of robustness to attack and image quality are out of the tolerance, the tolerance of image-quality degradation is increased and the parameter group is changed so as to further degrade the image quality. [0058]
  • Accordingly, a larger amount of digital-watermark information can be embedded, and thus the desired amount of digital-watermark information may be embedded. However, when the parameter group is changed so as to degrade the image quality, degradation of the image quality may reach its limit. For example, in digital-watermark embedding in which spaces between letters are adjusted, when letters contact each other, degradation of image quality reaches its limit. When the degradation of image quality reaches its limit, the parameter is changed so as to reduce the robustness to attack within the tolerance. [0059]
  • The threshold value may have a plurality of levels. In order to embed a desired amount of digital-watermark information, the image quality may be degraded first, and then the parameter group may be changed in the following order: degrade image quality, reduce robustness, degrade image quality, reduce robustness, degrade image quality, . . . . [0060]
  • On the other hand, the image-quality-priority forced embedding mode is used for minimizing degradation of the quality of the water-marked [0061] image 108. Therefore, when the desired amount of digital-watermark information cannot be embedded, the parameter is first changed so as to reduce the robustness to attack, not to degrade the image quality.
  • However, when the desired amount of digital-watermark information cannot be embedded by changing the parameter group in the above-described manner, the parameter group is changed again so as to also degrade the image quality within the tolerance. In order to perform the determination, a threshold value for defining the tolerance of degradation of each of robustness to attack and image quality is set in advance. [0062]
  • If both of robustness to attack and image quality are out of the degradation tolerance, it is determined that the tolerance is too small to embed the desired amount of information. [0063]
  • However, in the forced embedding mode, the desired amount of digital-watermark information must be forcedly embedded. Therefore, when both of robustness to attack and image quality are out of the tolerance, the tolerance of attack-robustness degradation is increased and the parameter group is changed so as to further reduce the robustness to attack. [0064]
  • Accordingly, a larger amount of digital-watermark information can be embedded, and thus the desired amount of digital-watermark information may be embedded. However, when the parameter group is changed so as to reduce the robustness to attack, degradation of the robustness may reach its limit. When the degradation of robustness to attack reaches its limit, the parameter is changed so as to degrade the image quality within the tolerance. [0065]
  • The threshold value may have a plurality of levels. In order to embed a desired amount of digital-watermark information, the robustness to attack may be reduced first, and then the parameter group may be changed in the following order: reduce robustness, degrade image quality, reduce robustness, degrade image quality, reduce robustness, . . . . [0066]
  • The above-described process in each mode is performed by the image-quality/robustness [0067] parameters control unit 106.
  • By setting the threshold value and the embedding modes, a desired amount of digital-watermark information can be embedded within the degradation tolerances of robustness to attack and image quality, the tolerances being defined by a user in advance. [0068]
  • Hereinafter, a specific method in each embodiment will be described. [0069]
  • <First Embodiment>[0070]
  • First, a digital-watermark embedding technique according to a first embodiment of the present invention will be described. [0071]
  • FIG. 2 shows the configuration of a digital-watermark embedding device of the first embodiment. As in the above-described configuration shown in FIG. 1, the digital-watermark embedding device includes an [0072] image input unit 201; a watermark information embedding unit 207; an image-quality/robustness parameters control unit 208; and an image output unit 209.
  • Further, in FIG. 2, a region-[0073] segmentation unit 202 for dividing a region of an input original image 200 and a circumscribed rectangle extracting unit 203 for extracting a region of a letter are provided. Digital-watermark information 204, embedding strength 205, and an embedding mode 206 are the same as the above-described digital-watermark information 103, the embedding strength 104, and the embedding mode 105, respectively.
  • FIG. 3 is a flowchart for explaining the operation of the digital-watermark embedding device shown in FIG. 2. Hereinafter, the operation of the digital-watermark embedding device shown in FIG. 2 will be described with reference to the flowchart shown in FIG. 3. [0074]
  • First, a document image (original image [0075] 200) to which digital-watermark information is to be embedded is read through the image input unit 201 and is input to the region-segmentation unit 202 (step S301). The region-segmentation unit 202 segments the input document image into a plurality of attribute regions: a text region, a figure region, a graphic region, a table region, and so on (step S302).
  • Then, the circumscribed [0076] rectangle extracting unit 203 extracts circumscribed rectangles of letters included in the text region (step S303). A circumscribed rectangle of a letter is a rectangle circumscribing a letter, and is generally known as a region for recognizing a letter. In this embodiment, however, the circumscribed rectangle is used as a minimum unit to be operated for embedding digital-watermark information.
  • In order to extract the circumscribed rectangle, the following method may be used. For example, each pixel value of the document image is projected onto a vertical coordinate axis. Then, a blank part (part without a black letter) is searched for so as to determine lines, and the document image is divided into lines. Then, the document image is projected onto a horizontal coordinate axis in units of lines, blank part is searched for, and each line is divided into a letter unit. Accordingly, each letter can be recognized in a circumscribed rectangle. [0077]
  • Then, the watermark [0078] information embedding unit 207 embeds the digital-watermark information in the document image (step S304). Accordingly, a water-marked image 210 is generated (step S305).
  • Now, a process of embedding digital-watermark information by rotating a letter so as to change the inclination angle of the letter, the process being performed by the watermark [0079] information embedding unit 207, will be described.
  • FIG. 4 is a flowchart for explaining the process. First, the digital-[0080] watermark information 204 to be embedded in the document image is input (step S401).
  • Then, a first letter to which the digital-[0081] watermark information 204 is to be embedded is selected in the document image (step S402).
  • Then, it is determined whether or not the bit of the digital-watermark information to be embedded is 1 (step S[0082] 403). If the bit is 1 (YES in the flowchart), the letter is inclined in a clockwise direction (step S404). On the other hand, if the bit is 0 (NO in the flowchart), the letter is inclined in a counterclockwise direction (step S405).
  • In this embodiment, 1-bit information is embedded in a letter by determining a clockwise turn or a counterclockwise turn. However, the present invention is not limited to this method. In a modification, an absolute value of the inclination angle may be divided into a plurality of levels and different pieces of embedding information may be allocated to these levels. Specifically, it is regarded that 0 (counterclockwise) or 1 (clockwise) is embedded. Further, a threshold value is set in increments of 2 degrees from 2 to 20 degrees of the inclination angle, and it is regarded that the bit of embedded watermark information is increased by 1 bit as the inclination angle increases by 2 degrees. In this case, 1 to 10 bits may be embedded in a letter. [0083]
  • Then, it is determined whether or not the letter which is being processed is the last letter of the document (step S[0084] 406). If the letter is the last letter (YES in the flowchart), the process of embedding digital-watermark information is completed. On the other hand, if the letter is not the last letter (NO in the flowchart), the process returns to step S402 so as to select a next letter.
  • The water-marked [0085] image 210 is output from the image output unit 209 (step S306). In this embodiment, output means printing of the image or storing the image data in a storage device or the like. Alternatively, the image data may be transmitted to another terminal through a network or the like.
  • By repeatedly embedding digital-watermark information in the document image, correct information can be extracted even when part of the digital-watermark information lacks or when error is caused. That is, robustness of the digital-watermark information can be increased. [0086]
  • As in the first embodiment, when digital-watermark information is embedded by inclining a letter, robustness to duplication of a water-marked image can be effectively increased by increasing rotation range δθ of a letter. However, the inclination angle of a letter becomes larger as the robustness is increased, and thus the appearance of the letter in the document image becomes unnatural. In the above-described algorithm of embedding digital-watermark information, a parameter determining the quality of image is the rotation range (inclination) of a letter. As the rotation range increases, robustness to duplication of a printed water-marked image increases, and/or the amount of information which can be embedded in the image advantageously increases. In that case, however, the document image looks unnatural, which is disadvantageous. [0087]
  • On the other hand, as the number of times a piece of digital-watermark information is embedded (repetition number) increases, reliability of extracting correct digital-watermark information increases. In that case, however, the amount of information which can be embedded in an image decreases disadvantageously. Herein, a parameter determining the robustness is indicated by the repetition number for clarity. [0088]
  • As described above, robustness to attack (embedding strength), image quality, and the amount of information are in tradeoff relationship. [0089]
  • In this embodiment, two other parameters which determine robustness to attack correspond to the rotation range of a letter and the repetition number of embedding desired digital-watermark information in a document image. The repetition number is the number of times a piece of digital-watermark information is embedded in a document image. [0090]
  • Herein, embedding strength is defined to be proportional to f(n), which is obtained by normalizing the repetition number n of embedding. On the other hand, image quality is defined to be inversely proportional to g(δθ), which is obtained by normalizing the rotation range δθ of a letter. [0091]
  • In this embodiment, the repetition number n is at least 3. That is, when a piece of digital-watermark information is embedded in a document image less than three times, it is determined that the entire digital-watermark information has not been embedded. This is the minimum number for reliably extracting digital-watermark information. [0092]
  • Also, a maximum value of the rotation range of a letter is set so as to prevent unnatural appearance thereof, for example, is set to 20 degrees. Actually, a physical minimum value of the repetition number is 1, and a physical maximum value of the rotation range of a letter is 180 degrees. These values may be naturally applied. [0093]
  • Next, the processes of the two types of forced embedding modes of the present invention: robustness-priority forced embedding mode and image-quality-priority forced embedding mode, will be described. [0094]
  • (i) Robustness-Priority Forced Embedding Mode [0095]
  • FIG. 5 is a flowchart showing a process performed when the robustness-priority forced embedding mode is selected. The process shown in FIG. 5 corresponds to a step of embedding digital-watermark information, that is, S[0096] 304 in FIG. 3.
  • First, in step S[0097] 304-1 a, desired embedding strength is specified and is input to the device. Then, in step S304-1 b, the repetition number and the rotation range are set to the initial values based on the embedding strength. Then, in step S304-1 c, all letters to be processed in the document image 200 are rotated in order so as to embed the digital-watermark information therein. After the digital-watermark information has been embedded in all the letters, the process proceeds to step S304-1 d.
  • In step S[0098] 304-1 d, it is checked whether or not the entire desired digital-watermark information 204 has been embedded in the document image 200. If the entire information has not been embedded (NO in the flowchart), the process proceeds to step S304-1 e in order to embed the entire information in the document image.
  • Repetition of embedding, which will be described later, is restarted in a state that the previous embedding is regarded not to have been performed. That is, actually, digital-watermark information is embedded in the original document image based on a new parameter. Therefore, the previous digital-watermark information is not overwritten with new digital-watermark information. [0099]
  • In step S[0100] 304-1 e, it is determined whether or not the rotation range of a letter has reached a threshold value. If the rotation range has not reached the threshold value (NO in the flowchart), the process proceeds to step S304-1 f.
  • In step S[0101] 304-1 f, since a high priority is given to robustness to attack in this mode, the rotation range of a letter is increased so as to degrade the image quality. Then, digital-watermark information is embedded again based on the newly set parameters (repetition number and rotation range). The above-described steps are repeatedly performed so as to embed the entire desired digital-watermark information.
  • FIG. 6 shows the change in f(n) and g(δθ). Arrows in the figure indicate a state where the parameters of the repetition number (f) and the rotation range (g) change to an unfavorable state. That is, in FIG. 6, the arrow of the repetition number (f) indicates decrease, and the robustness to attack reduces in accordance with the decrease. On the other hand, the arrow of the rotation range (g) indicates increase, and the quality of the water-marked image is degraded in accordance with the increase. [0102]
  • Steps S[0103] 304-1 e and S304-1 f correspond to stage (1) in FIG. 6. In stage (1), further degradation of the image quality (increase in rotation range) is allowed.
  • In step S[0104] 304-1 e, if the rotation range has reached Threshold 1 or Threshold 2 (YES in step S304-1 e), a step of increasing the rotation range is stopped so as to try to decrease the repetition number.
  • At this time, in step S[0105] 304-1 g, it is determined whether or not the repetition number has reached the threshold value. If the repetition number has not reached the threshold value (NO in the flowchart), the process proceeds to step S304-1 h, where the repetition number is decreased so as to increase the amount of information which can be embedded. The change in the parameter (repetition number) at this time corresponds to stage (2) in FIG. 6.
  • On the other hand, in step S[0106] 304-1 g, if the repetition number has reached the threshold value (YES in the flowchart), the process proceeds to step S304-1 i, where it is determined whether or not the rotation range has reached the maximum. If the rotation range has not reached the maximum (NO in the flowchart), the process proceeds to step S304-1 j, where the rotation range is increased again. The change in the parameter (rotation range) at this time corresponds to stage (3) in FIG. 6. In stage (3), the level of degradation of image quality is over Threshold 1, and thus the threshold value is changed so as to embed the entire digital-watermark information correctly.
  • On the other hand, in step S[0107] 304-1 i, if the rotation range has reached the maximum of 180 degrees (YES in the flowchart), the process proceeds to step S304-1 k, where it is determined whether or not the repetition number has reached the minimum of 1. If the repetition number has not reached the minimum (NO in the flowchart), the process proceeds to step S304-1 l, where the repetition number is reduced again. The change in the parameter (repetition number) at this time corresponds to stage (4) in FIG. 6. On the other hand, if the repetition number has reached the minimum (YES in the flowchart), the process of embedding the digital-watermark information cannot be continued any more (correct information cannot be embedded). Thus, the process proceeds to step S304-1 m, where it is determined that embedding ended in failure, so as to stop the embedding process.
  • (ii) Image-Quality-Priority Forced Embedding Mode [0108]
  • Next, an embedding process performed when the image-quality-priority forced embedding mode is selected will be described. [0109]
  • FIG. 7 is a flowchart showing a process performed when the image-quality-priority forced embedding mode is selected. [0110]
  • First, in step S[0111] 304-2 a, desired embedding strength is specified and is input to the device. Then, in step S304-2 b, the repetition number and the rotation range are set to the initial values based on the embedding strength. Then, in step S304-2 c, all letters to be processed in the document image 200 are rotated in order so as to embed the digital-watermark information therein. After digital-watermark information has been embedded in all the letters, the process proceeds to step S304-2 d.
  • In step S[0112] 304-2 d, it is checked whether or not the entire desired digital-watermark information 204 has been embedded in the document image 200. If the entire information has not been embedded (NO in the flowchart), the process proceeds to step S304-2 e in order to embed the entire information in the document image. Then, a process of correctly embedding the digital-watermark information is performed in accordance with the following steps.
  • FIG. 8 shows the change in f(n) and g(δθ) in the image-quality-priority forced embedding mode. Arrows in the figure indicate a state where the parameters of the repetition number (f) and the rotation range (g) changes to an unfavorable state. The system of FIG. 8 is the same as that of FIG. 6, and thus a detailed description is omitted. [0113]
  • In step S[0114] 304-2 e, it is determined whether or not the repetition number has reached the threshold value. If the repetition number has not reached the threshold value (NO in the flowchart), the process proceeds to step S304-2 f, where the repetition number is reduced. The change in the parameter (repetition number) at this time corresponds to stage (1) in FIG. 8. Herein, since the image-quality-priority mode is selected, reduction of robustness to attack is allowed to some extent, and increase in the rotation range is suppressed. On the other hand, in step S304-2 e, if the repetition number has reached the threshold value (YES in the flowchart), a step of decreasing the repetition number is suspended.
  • Then, in step S[0115] 304-2 g, it is determined whether or not the rotation range has reached the threshold value. If the rotation range has not reached the threshold value (NO in the flowchart), the process proceeds to step S304-2 h, where the rotation range is increased so as to increase the amount of digital-watermark information which can be embedded. The change in the parameter (rotation range) at this time corresponds to stage (2) in FIG. 8.
  • On the other hand, if the rotation range has reached Threshold 1 (YES in the flowchart), degradation of the image quality has reached a first-stage limit, and thus the process proceeds to step S[0116] 304-2 i, where it is determined whether or not the repetition number has reached the minimum. If the repetition number has not reached the minimum (NO in the flowchart), the process proceeds to step S304-2 j, where the repetition number is decreased again so as to try to increase the amount of digital-watermark information which can be embedded. The change in the parameter (repetition number) at this time corresponds to stage (3) in FIG. 8.
  • On the other hand, in step S[0117] 304-2 i, if the repetition number has reached the minimum (YES in the flowchart), the process proceeds to step S304-2 k, where it is determined whether or not the rotation range has reached the maximum. If the rotation range has not reached the maximum (NO in the flowchart), the process proceeds to step S304-2 l, where the rotation range is increased so as to try to increase the amount of digital-watermark information which can be embedded. The change in the parameter at this time corresponds to stage (4) in FIG. 8.
  • On the other hand, in step S[0118] 304-2 k, if the rotation range has reached the maximum (YES in the flowchart), the process of embedding the digital-watermark information cannot be continued any more (correct information cannot be embedded). Thus, the process proceeds to step S304-2 m, where it is determined that embedding ended in failure, so as to stop the embedding process.
  • As described above, in the robustness-priority embedding mode, degradation of image quality is controlled first in order to embed a desired amount of digital-watermark information. When stepwise degradation is required, the parameter group is changed in the following order: degrade image quality to a first threshold (1), reduce robustness to a first threshold (2), degrade image quality to a second threshold (3), reduce robustness to a second threshold (4), degrade image quality to a third threshold (5), reduce robustness to a third threshold (6), [0119]
  • On the other hand, in the image-quality-priority embedding mode, degradation of robustness to attack is controlled first in order to embed a desired amount of digital-watermark information. When stepwise degradation is required, the parameter group is changed in the following order: reduce robustness to a first threshold (1), degrade image quality to a first threshold (2), reduce robustness to a second threshold (3), degrade image quality to a second threshold (4), reduce robustness to a third threshold (5), degrade image quality to a third threshold (6) . . . . [0120]
  • <Second Embodiment>[0121]
  • In the first embodiment, the repetition number is regarded as a first parameter determining robustness to attack. However, another value may be regarded as the first parameter determining robustness to attack. In the second embodiment, information to be embedded is encoded with an error-correction code in a process of embedding digital-watermark information by changing the inclination angle of a letter. [0122]
  • When digital-watermark information is embedded in a document image, encoding with an error-correction code can be adopted in order to strengthen the robustness to attack on the digital-watermark information. In the second embodiment, error-correction ability in the error-correction encoding is regarded as the first parameter determining the robustness to attack. The second parameter determining image quality is the rotation range, as in the first embodiment. [0123]
  • The possibility of correctly extracting and recognizing digital-watermark information increases and robustness to attack is improved as the error-correction ability of the error-correction code becomes higher. On the other hand, when digital-watermark information is encoded into a code having high error-correction ability, the code length increases, and thus the amount of digital-watermark information which can be embedded substantially decreases. This principle is the same as in the repetition number in the first embodiment. [0124]
  • In the first embodiment, only the repetition number is regarded as the first parameter for clarity. However, as described in the first embodiment, robustness to attack does not always depend only on a single parameter. For example, robustness to attack may also depend on error-correction ability and rotation range of a letter. Therefore, various factors may be regarded as a parameter which determines degradation of each of robustness to attack and image quality. [0125]
  • In this embodiment, embedding strength (robustness to attack) is represented by multiplying f(t) obtained by normalizing error-correction ability t by g(δθ) obtained by normalizing the rotation range δθ. That is, the following equation is obtained: [0126]
  • Strength=f(tg(δθ)  equation (1).
  • In this embodiment, in order to embed digital-watermark information having some robustness to attack, t and δθ are set to values so that the Strength can be obtained. Herein, a threshold value defining the tolerance of error-correction ability is set to 1, and a physical limit is set to 0. The rotation range of a letter is the same as in the first embodiment. [0127]
  • (iii) Robustness-Priority Forced Embedding Mode [0128]
  • First, the robustness-priority forced embedding mode will be described. FIG. 9 is a flowchart for explaining an embedding process performed when the robustness-priority forced embedding mode is selected. In the second embodiment, the step of changing the repetition number in FIG. 5 is replaced by a step of changing the error-correction ability of an error-correction code, and the above-described embedding strength is applied. Hereinafter, part different from the first embodiment is mainly explained. Steps S[0129] 304-3 a to S304-3 d are the same as in FIGS. 5 and 7.
  • In step S[0130] 304-3 e, it is determined whether or not the error-correction ability t is more than 0. If the error-correction ability t is more than 0 (YES in the flowchart), the process proceeds to step S304-3 f, where the error-correction ability is reduced and the code length obtained after error-correction encoding is reduced, so as to increase the amount of digital-watermark information which can be embedded.
  • Since a priority is given to robustness, δθ is obtained based on the following equation: [0131]
  • δθ=g −1(Strength/f(t))  equation (2)
  • so that the substantial robustness becomes equal to specified strength. In this way, the tolerance of rotation range of a letter is set large (steps S[0132] 304-3 g and S304-3 h).
  • Then, in step S[0133] 304-3 i, it is determined whether or not the rotation range has reached the threshold value. If the rotation range has not reached the threshold value (NO in the flowchart), the process returns to step S304-3 c, where digital-watermark information is embedded again based on a newly set parameter. Then, the above-described steps are repeatedly performed so as to correctly embed the entire digital-watermark information. If the rotation range has reached the threshold value (YES in the flowchart), the process proceeds to step S304-3 l.
  • FIG. 10 shows the change in the error-correction ability (f) and the rotation range (g). Arrows in the figure indicate a state where the parameters of the error-correction ability (f) and the rotation range (g) change to an unfavorable state. The system of FIG. 10 is the same as that of FIG. 6. A feature in FIG. 10 is that, in a first stage ([0134] 1) of adjusting the parameters, the parameters (f and g) are changed so that the robustness (strength) to attack is kept constant. Another feature is that the parameter g is continuously increased in the transition from stage (2) to stage (3).
  • In step S[0135] 304-3 d, it is checked whether or not the entire desired digital-watermark information 204 has been embedded in the document image 200. If the entire information has not been embedded (NO in the flowchart), the process proceeds to step S304-3 e so as to embed the entire digital-watermark information in the document image in accordance with the following steps.
  • In step S[0136] 304-3 e, if the error-correction ability has reached the threshold value (NO in the flowchart), the process of reducing the error-correction ability of the error-correction code is stopped and the process proceeds to step S304-3 j. In step S304-3 j, it is determined whether or not the rotation range has reached the threshold value.
  • In step S[0137] 304-3 j, if the rotation range has not reached the threshold value (NO in the flowchart), the process proceeds to step S304-3 k, where the tolerance of rotation range is increased so as to increase the amount of digital-watermark information which can be embedded. The change in the parameter (rotation range) at this time corresponds to stage (2) in FIG. 10.
  • In step S[0138] 304-3 j, if the tolerance of rotation range has reached the threshold value, the process proceeds to step S304-3 l. In step S304-3 l, it is determined whether or not the rotation range has reached the maximum. If the rotation range has reached the maximum, the process proceeds to step S304-3 m, where the tolerance of rotation range is increased so as to increase the amount of digital-watermark information which can be embedded. The change in the parameter (rotation range) at his time corresponds to stage (3) in FIG. 10.
  • The error-correction ability is reduced in stage ([0139] 4), the rotation range is increased in stage (5), and the error-correction ability is reduced again in stage (6). Such a switching operation is the same as in the first embodiment.
  • (iv) Image-Quality-Priority Forced Embedding Mode [0140]
  • The process in the image-quality-priority forced embedding mode is shown in FIG. 11. In this process, error-correction ability is regarded as the first parameter, which corresponds to the repetition number in FIG. 7. Therefore, the corresponding description will be omitted. [0141]
  • <Third Embodiment>[0142]
  • In the above-described embodiments, it is provided that the letters included in the document image to which digital-watermark information is embedded is included in a page. However, the document image often includes a plurality of pages. In the third embodiment, digital-watermark information is embedded in a plurality of pages, in addition to the processes of reducing the repetition number and the error-correction ability. [0143]
  • FIGS. 12 and 13 show the operations of the third embodiment. In the processes shown in these figures, a step of setting a page to which digital-watermark information is embedded to a next page is performed when it is determined that the repetition number has reached the minimum (step S[0144] 304-1 k in FIG. 5) in the embedding process of the first embodiment. FIG. 12 shows a process of the robustness-priority forced embedding mode as in FIG. 5, and the process shown in FIG. 12 is the same as that in FIG. 5, except that a next page may exist in FIG. 12. FIG. 13 shows a process of the image-quality-priority forced embedding mode as in FIG. 7, and the process shown in FIG. 13 is the same as that in FIG. 7, except that a next page may exist in FIG. 13. Hereinafter, both processes are described briefly.
  • In step S[0145] 304-5 k in FIG. 12, it is determined whether or not the repetition number has reached the minimum. If the repetition number has reached the minimum (YES in the flowchart), the process proceeds to step S304-5 m, where it is determined whether or not the page which is being processed is the last page. If a next page exist (NO in the flowchart), the process proceeds to step S304-5 o, where the page to which digital-watermark information is to be embedded is changed to the next page. Then, the step of embedding digital-watermark information is performed again. If a next page does not exist (YES in the flowchart), the process of embedding digital-watermark information is ended in failure (step S304-5 n).
  • In step S[0146] 304-6 k in FIG. 13, it is determined whether or not the rotation range has reached the maximum. If the rotation range has reached the maximum (YES in the flowchart), the process proceeds to step S304-6 m, where it is determined whether or not the page which is being processed is the last page. If a next page exist (NO in the flowchart), the process proceeds to step S304-6 o, where the page to which digital-watermark information is to be embedded is changed to the next page. Then, the step of embedding digital-watermark information is performed again. If a next page does not exist (YES in the flowchart) in step S304-6 m, the process of embedding digital-watermark information is ended in failure (step S304-6 n).
  • In this embodiment, a problem of a document image, that is, the number of letters in which digital-watermark information is to be embedded is limited, can be solved by forming the document image with a plurality of pages. [0147]
  • <Fourth Embodiment>[0148]
  • The embedding strength (robustness to attack) in the first embodiment can be associated with each parameter, as in the second embodiment. At this time, the error-correction ability t in the equations (1) and (2) in the second embodiment is replaced by the repetition number n. [0149]
  • It is also possible to define that the embedding strength in the second embodiment depends only on f, which is obtained by normalizing the repetition number n, as in the first embodiment. [0150]
  • In the above-described embodiments, digital-watermark information is embedded by rotating a letter, but another method may be used. For example, digital-watermark information may be embedded by changing a space between letters. Hereinafter, this embedding method will be described. [0151]
  • FIG. 14 shows part of a document image which has not been water-marked. FIG. 15 shows part of a document image obtained by water-marking the document image shown in FIG. 14. In FIG. 14, P[0152] 0, S0, P1, and S1 are values indicating the lengths of spaces between the letters. P0, S0, P1, and S1 in FIG. 14 are adjusted based on a predetermined rule in order to embed digital-watermark information, so as to be P0′, S0′, P1′, and S1′ in FIG. 15.
  • In FIGS. 14 and 15, five letters and four spaces are provided. In this embodiment, two space-lengths P[0153] n and Sn are used for embedding 1-bit digital-watermark information. Thus, 2-bit digital-watermark information can be embedded by using four spaces P0, S0, P1, and S1. In this embodiment, Pn>Sn indicates 1 and Pn<Sn indicates 0.
  • In FIG. 14, when the letter between P[0154] 0 and S0 is shifted to the left and when the letter between P1 and S1 is shifted to the left, P0′<S0′ and P1′<S1′, as shown in FIG. 15. In this case, 2-bit digital-watermark information “0,0” has been embedded.
  • On the other hand, when the letter between P[0155] 0 and S0 is shifted to the left and when the letter between P1 and S1 is shifted to the right, P0′<S0′ and P1′>S1′ in FIG. 15. In this case, 2-bit digital-watermark information “0,1” has been embedded.
  • In this embodiment, movement amount x of a letter is used instead of the rotation amount θ of a letter in the first to third embodiments. Accordingly, the first parameter corresponds to the repetition number or the error-correction ability as in the first to third embodiments, and the second parameter corresponds to the movement range of each letter. [0156]
  • <Fifth Embodiment>[0157]
  • FIG. 16 shows the configuration of a digital-watermark embedding device according to a fifth embodiment, and FIG. 17 shows the operation of the device shown in FIG. 16. Hereinafter, the function and operation of each unit of this embodiment will be described with reference to FIGS. 16 and 17. [0158]
  • First, a document image (original image [0159] 1100) in which digital-watermark information is to be embedded is read through an image input unit 1101 and is input to a region-segmentation unit 1102 (step S1301). The region-segmentation unit 1102 segments the input document image into a plurality of attribute regions: a text region, a figure region, a graphic region, a table region, and so on (step S1302).
  • A circumscribed [0160] rectangle extracting unit 1103 extracts circumscribed rectangles of the letters included in the text region (step S1303). A circumscribed rectangle of a letter is a rectangle circumscribing a letter, and is generally known as a region for recognizing a letter. In this embodiment, however, the circumscribed rectangle is used as a minimum unit to be operated for embedding digital-watermark information. A method of extracting the circumscribed rectangle has been described above.
  • Now, a digital-watermark information embedding method performed by a watermark [0161] information embedding unit 1108 is described. FIG. 18 shows a process of embedding digital-watermark information by changing the inclination angle of a letter. First, digital-watermark information to be embedded is input (step S1401). Then, the first letter in which digital-watermark information is embedded is selected (step S1402). Then, it is determined whether or not the bit of the digital-watermark information to be embedded is 1 (step S1403). If the bit is 1 (YES in the flowchart), the letter is inclined in a clockwise direction (step S1404). On the other hand, if the bit is 0 (NO in the flowchart), the letter is inclined in a counterclockwise direction (step S1405). The embedding information can be increased in accordance with the absolute value of the inclination angle. For example, 0 or 1 is determined according to counterclockwise or clockwise. In this case, a threshold value is set in increments of 2 degrees from 2 to 20 degrees of the inclination angle, and 10 bits may be embedded in a letter. The above description is basically the same as in the first embodiment.
  • Then, it is determined whether or not the letter is the last letter of the document (step S[0162] 1406). If the letter is the last letter (YES in the flowchart), the process of embedding digital-watermark information is completed. On the other hand, if the letter is not the last letter (NO in the flowchart), the process returns to step S1402 so as to select a next letter. The water-marked image is output from the image output unit 1110 (step S1306). The output image may be printed out or may be stored in a storage device or the like in the form of image data. Alternatively, the image data may be transmitted to another terminal through a network or the like.
  • By repeatedly embedding digital-watermark information in the document image, correct information can be extracted even when part of the digital-watermark information lacks or when error is caused. That is, robustness can be increased. [0163]
  • As in this embodiment, when digital-watermark information is embedded by inclining a letter, robustness to duplication of a water-marked image can be effectively increased by increasing a letter rotation range δθ. However, the inclination angle of a letter becomes larger as the robustness is increased, and thus the appearance of the letter in the document image becomes unnatural. In the above-described algorithm of embedding digital-watermark information, a parameter determining the quality of image is the rotation range (inclination) of a letter. As the rotation range increases, robustness to duplication of a printed water-marked image increases, and/or the amount of information which can be embedded in the image advantageously increases. In that case, however, the document image looks unnatural, which is disadvantageous. [0164]
  • On the other hand, as the number of times a piece of digital-watermark information is embedded (repetition number) increases, reliability of extracting correct digital-watermark information increases. In that case, however, the amount of information which can be embedded in an image decreases disadvantageously. Herein, a parameter determining the robustness corresponds only to the repetition number for clarity. [0165]
  • Herein, embedding strength is indicated by an integer from 1 to 10 for user's intuitive understanding. This range may be changed, and continuous values may be used instead of discrete values. [0166]
  • FIG. 19 is a flowchart for explaining an embedding process performed by using the embedding [0167] capacity checking unit 1104 and the image-quality/robustness parameters control unit 1109. First, embedding strength 1106, an embedding mode 1107, and digital-watermark information 1105 are input (step S304-1 a).
  • Then, the number of letters in the [0168] image 1100, in which the digital-watermark information is to be embedded, is counted, so as to obtain basic data for calculating the capacity for embedding (step S304-1 b). The minimum of the repetition number is set to 3, for example. This is the minimum number for absorbing instability at extraction of watermark information. The maximum of repetition number is set so that the amount of information which can be embedded does not become 0.
  • Then, the repetition number, which is an embedding parameter, is changed from the minimum to the maximum, so as to calculate the embedding capacity (step S[0169] 304-1 c). Herein, the image-quality parameter is fixed. In an algorithm for the calculation, embedding capacity can be obtained by dividing the number of letters by the repetition number. Of course, the embedding capacity is further reduced when header information is stored. In accordance with the algorithm, the repetition number is sequentially increased so as to calculate corresponding embedding capacity. FIG. 20 shows the combinations of values for obtaining each embedding capacity. In FIG. 20, when the repetition number is 3, the embedding capacity is 200.
  • Then, the calculated values are associated with embedding strength (step S[0170] 304-1 d). As shown in FIG. 20, 19 types of embedding capacitance are possible. On the other hand, the embedding strength is fixed to 10 levels, and thus the parameters and the embedding capacity must be thinned out. In this example, the embedding capacity when the repetition number is an even number is associated with each strength.
  • FIG. 20 shows embedding capacity labeled with l[0171] 1 to l10, which is associated with embedding strength so as to present to the user. The corresponding image-quality parameters are constant, but they are labeled with q1 to q10 for generality. The corresponding repetition numbers are also labeled with n1 to n10. FIG. 21 shows groups of values which are associated with embedding strength.
  • Then, by using the result of step S[0172] 304-1 d, it is determined whether or not the embedding capacity obtained based on the embedding strength input by the user is larger than the digital-watermark information to be embedded (step S304-1 e). If the embedding capacity is larger than the digital-watermark information (YES in the flowchart), the embedding process is continued (step S304-1 k). At this time, the repetition number of embedding is maximized within the range of capacity for storing the digital-watermark information to be embedded.
  • For example, the user inputs digital-watermark information having embedding strength of 6 and length of 12. As can be understood from FIGS. 20 and 21, embedding capacity corresponding to embedding [0173] strength 6 is 18. However, since the size of the digital-watermark information is 12, the repetition number can be increased to 15, which corresponds to embedding capacity of 13. That is, robustness can be increased to embedding strength of 7.
  • On the other hand, when the result of step S[0174] 304-1 e is NO, it is determined whether or not the input embedding mode is the robustness-priority forced embedding mode (step S304-1 f). If the result is YES, the image-quality parameter is decreased (step S304-1 g), so as to perform the embedding step (step S304-1 k).
  • On the other hand, when the result of step S[0175] 304-1 f is NO, it is determined whether or not the input embedding mode is the image-quality-priority forced embedding mode (S304-1 h). If the result is YES, the robustness parameter is decreased (step S304-1 i), so as to perform the embedding step (step S304-1 k). On the other hand, if the result is NO, the mode is the normal mode. In this case, embedding failure is notified to the user (step S304-1 j), so as to end the process.
  • <Sixth Embodiment>[0176]
  • In the fifth embodiment, information input by the user is embedded in accordance with an embedding mode, and the embedding process is ended in failure if embedding capacity is insufficient. In the sixth embodiment, capacity which is available for embedding is presented in advance, so that the user can specify embedding strength. Hereinafter, part different from that of the fifth embodiment will be described with reference to the drawings. [0177]
  • FIG. 22 is a flowchart for explaining the operation of the digital-watermark embedding device according to the sixth embodiment. A step of obtaining basic data for calculating embedding capacity (step S[0178] 304-2 a), a step of calculating embedding capacity (step S304-2 b), and a step of associating parameters with embedding strength (step S304-2 c) are the same as in the fifth embodiment. Then, a list of obtained embedding strength and corresponding embedding capacity is presented to the user (step S304-2 d).
  • The user refers to the presented information so as to know constraint of embedding strength for obtaining desired embedding strength. After obtaining the information, the user inputs embedding strength, information to be embedded, and an embedding mode for specifying the extent to which embedding parameters can be changed (step S[0179] 304-2 e). The following steps are the same as in the fifth embodiment.
  • <Seventh Embodiment>[0180]
  • In the fifth and sixth embodiments, digital-watermark information is embedded by rotating a letter. The digital-watermark information can also be embedded by changing the space (length) between letters, as in the fourth embodiment. This method has been described above, and thus is not described here. [0181]
  • When digital-watermark information is embedded by changing the space between letters and when basic data for calculating embedding capacity is obtained in step S[0182] 304-2 b in FIG. 22, the data is not a simple number of letters, but ½ of the number of spaces between letters. The method for calculating the other values is the same as the above.
  • FIG. 23 shows an electrical configuration of the digital-watermark embedding device of the present invention. In order to realize the digital-watermark embedding device, all the functions shown in FIG. 23 are not necessarily required. [0183]
  • In FIG. 23, a [0184] computer 1401 is a generally-used personal computer. An image is read by an image input device 1417, such as a scanner, and is input to the computer 1401, where the image may be edited and stored therein. Also, the image obtained through the image input device 1417 can be printed by a printer 1416. Instructions from the user are input through a mouse 1413 or a keyboard 1414.
  • In the [0185] computer 1401, blocks (described later) are connected to each other through a bus 1407, so that various types of data may be transmitted/received by the blocks. In FIG. 23, an MPU 1402 controls the operations of the blocks in the computer 1401 and executes a stored program. A main memory 1403 is used for temporarily storing a program or image data to be processed, for the process executed by the MPU 1402. A hard disk drive (HDD) 1404 can store a program and image data to be transferred to the main memory 1403 and so on and can store processed image data.
  • A scanner interface (I/F) [0186] 1415 is connected to the scanner 1417, which scans a document or a film so as to generate image data, and the image data obtained by the scanner 1417 can be input through the scanner interface 1415. A printer interface 1408 is connected to the printer 1416, which prints image data, and transmits the image data to be printed to the printer 1416.
  • A [0187] CD drive 1409 reads data stored in a CD (CD-R/CD-RW) into the computer, the CD being an external storage medium, and writes out the data. An FD drive 1411 reads data stored in an FD into the computer and writes out the data, as the CD drive 1409. A DVD drive 1410 reads data stored in a DVD into the computer and writes out the data, as the FD drive 1411. When a program for editing images or a printer driver is stored in the CD, FD, or DVD, the program is installed in the HDD 1404, and then the program is transferred to the main memory 1403 as required.
  • An interface (I/F) [0188] 1412 is connected to the mouse 1413 and the keyboard 1414 so as to receive input instructions therefrom. A monitor 1406 is a display device for displaying a result of extracting process and processing of digital-watermark information. A video controller 1405 is used for transmitting display data to the monitor 1406.
  • The present invention may be applied to a system including a plurality of devices (for example, host computer, interface device, reader, and printer) or may be applied to a single device (for example, copying machine or fax machine). [0189]
  • Of course, the object of the present invention can be achieved by supplying a recording medium (or storage medium) containing program code of software for realizing the function of the above-described embodiments to a system or device so that the program code stored in the recording medium is read and executed by the computer (or CPU or MPU) in the system or device. In this case, the program code itself read from the recording medium realizes the function of the above-described embodiments. Therefore, the recording medium containing the program code is included in the present invention. [0190]
  • The functions of the above-described embodiments may be realized by executing the program code read by the computer. In addition, an operating system (OS) working in the computer may execute part or whole of actual processing based on the instructions of the program code, so that the functions of the above-described embodiments are realized by the processing. [0191]
  • Further, the program code read from the recording medium may be written in a memory provided in an expansions card inserted into the computer or an expansions unit connected to the computer and a CPU provided in the expansions card or the expansions unit may execute part or whole of actual processing based on the instructions of the program code, so that the functions of the above-described embodiments are realized by the processing. [0192]
  • If the present invention is applied to the recording medium, the program code corresponding to the above-described flowcharts is stored in the recording medium. [0193]
  • As described above, according to the present invention, an error state in which digital-watermark information cannot be embedded can be suppressed. That is, digital-watermark information can be embedded forcedly. Also, various parameters can be efficiently adjusted in accordance with a desired priority. Specifically, when a high priority is given to image quality, various parameters can be changed stepwise while the image quality can be maintained. On the other hand, when a high priority is given to robustness to attack (embedding strength), various parameters can be changed stepwise while the robustness can be maintained. [0194]
  • The priority can be set before operation, or when it is determined that the entire digital-watermark information cannot be embedded correctly in an image. That is, the priority should be set before deciding the most important parameter so as to change parameter group. [0195]
  • Further, according to the method of the present invention, a user can recognize the relationship between the amount of information which can be embedded and embedding strength when digital-watermark information is embedded in a document image. [0196]
  • While the present invention has been described with reference to what are presently considered to be the preferred embodiments, it is to be understood that the invention is not limited to the disclosed embodiments. On the contrary, the invention is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims. The scope of the following claims is to be accorded the broadest interpretation so as to encompass all such modifications and equivalent structures and functions. [0197]

Claims (18)

What is claimed is:
1. A digital-watermark embedding method comprising:
a generating step of generating digital-watermark information;
an input step of inputting an image;
a setting step of setting a first parameter determining robustness to attack on the digital-watermark information embedded in the image and a second parameter determining quality of the image in which the digital-watermark information is embedded;
an embedding step of embedding the digital-watermark information in the input image by using the first and second parameters;
a determination step of determining whether or not the entire digital-watermark information can be embedded in the image;
an update step of updating one of the parameters so as to embed a larger amount of digital-watermark information in the image when it is determined that the entire digital-watermark information cannot be embedded in the determination step, the update step being performed as a first stage; and
an embedding step of embedding the digital-watermark information in the input image again by using the updated parameter,
wherein the determination step is performed for each of the embedding steps.
2. A method according to claim 1, further comprising:
an update step of updating the second parameter so as to degrade the image quality when it is determined that the entire digital-watermark information cannot be embedded in the determination step, the update step being performed as a first stage; and
an embedding step of embedding the digital-watermark information in the input image again by using the first parameter and the updated second parameter.
3. A method according to claim 2, further comprising:
an update step of updating the first parameter so as to degrade the robustness when it is determined that the entire digital-watermark information cannot be embedded in the determination step and when the degradation of the image quality reaches a first threshold value, the update step being performed as a second stage; and
an embedding step of embedding the digital-watermark information in the input image again by using the updated first parameter and the second parameter.
4. A method according to claim 3, further comprising:
an update step of updating the second parameter so as to degrade the image quality when it is determined that the entire digital-watermark information cannot be embedded in the determination step, when the degradation of the image quality reaches the first threshold value, and when the degradation of the robustness reaches a first threshold value, the update step being performed as a third stage; and
an embedding step of embedding the digital-watermark information in the input image again by using the first parameter and the updated second parameter.
5. A method according to claim 1, further comprising:
an update step of updating the first parameter so as to degrade the robustness when it is determined that the entire digital-watermark information cannot be embedded in the determination step, the update step being performed as a first stage; and
an embedding step of embedding the digital-watermark information in the input image again by using the updated first parameter and the second parameter.
6. A method according to claim 5, further comprising:
an update step of updating the second parameter so as to degrade the image quality when it is determined that the entire digital-watermark information cannot be embedded in the determination step and when the degradation of the robustness reaches a first threshold value, the update step being performed as a second stage; and
an embedding step of embedding the digital-watermark information in the input image again by using the first parameter and the updated second parameter.
7. A method according to claim 6, further comprising:
an update step of updating the first parameter so as to degrade the robustness when it is determined that the entire digital-watermark information cannot be embedded in the determination step, when the degradation of the robustness reaches the first threshold value, and when the degradation of the image quality reaches a first threshold value, the update step being performed as a third stage; and
an embedding step of embedding the digital-watermark information in the input image again by using the updated first parameter and the second parameter.
8. A method according to claim 1, wherein a plurality of letters are included in the image, and, in the embedding step, the digital-watermark information is embedded in the image by rotating the letters so as to change the inclination angle of the letters.
9. A method according to claim 8, wherein the second parameter specifies the range of rotation angle of the letters.
10. A method according to claim 8, wherein the first parameter specifies the repetition number of embedding the digital-watermark information in the image.
11. A method according to claim 8, wherein the digital-watermark information is encoded with an error-correction code, and the first parameter specifies the error-correction ability of the encoded digital-watermark information.
12. A method according to claim 1, wherein a plurality of letters are included in the image, and, in the embedding step, the digital-watermark information is embedded in the image by changing the positions of the letters so as to adjust spaces between the letters.
13. A method according to claim 12, wherein the second parameter specifies the range of movement of the letters.
14. A method according to claim 12, wherein the first parameter specifies the repetition number of embedding the digital-watermark information in the image.
15. A method according to claim 12, wherein the digital-watermark information is encoded with an error-correction code, and the first parameter specifies the error-correction ability of the encoded digital-watermark information.
16. A method according to claim 1, wherein the both parameters are updated so as to embed a larger amount of digital-watermark information in the image when it is determined that the entire digital-watermark information cannot be embedded in the determination step, the update step being performed as a first stage.
17. A digital-watermark embedding device comprising:
a generator for generating digital-watermark information;
an input unit for inputting an image;
a setting unit for setting a first parameter determining robustness to attack on the digital-watermark information embedded in the image and a second parameter determining quality of the image in which the digital-watermark information is embedded;
an embedding unit for embedding the digital-watermark information in the input image by using the first and second parameters;
a determination unit for determining whether or not the entire digital-watermark information can be embedded in the image; and
an update unit for updating one of the parameters so as to embed a larger amount of digital-watermark information in the image when the determination unit determines that the entire digital-watermark information cannot be embedded, the update being performed as a first stage,
wherein the embedding unit embeds the digital-watermark information in the input image again by using the updated parameter, and
the determination unit performs determination every time embedding is performed.
18. A storage medium storing a digital-watermark embedding program, the program comprising:
a generating step of generating digital-watermark information;
an input step of inputting an image;
a setting step of setting a first parameter determining robustness to attack on the digital-watermark information embedded in the image and a second parameter determining quality of the image in which the digital-watermark information is embedded;
an embedding step of embedding the digital-watermark information in the input image by using the first and second parameters;
a determination step of determining whether or not the entire digital-watermark information can be embedded in the image;
an update step of updating one of the parameters so as to embed a larger amount of digital-watermark information in the image when it is determined that the entire digital-watermark information cannot be embedded in the determination step, the update step being performed as a first stage; and
an embedding step of embedding the digital-watermark information in the input image again by using the updated parameter,
wherein the determination step is performed for each of the embedding steps.
US10/659,037 2002-09-10 2003-09-09 Digital-watermark embedding method and device and storage medium for storing the method Abandoned US20040120544A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/740,770 US7386149B2 (en) 2002-09-10 2007-04-26 Method and apparatus for embedding digital-watermark using robustness parameter

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2002264187A JP2004104494A (en) 2002-09-10 2002-09-10 Electronic watermark embedding device and its control method
JP2002/264187 2002-09-10

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/740,770 Continuation US7386149B2 (en) 2002-09-10 2007-04-26 Method and apparatus for embedding digital-watermark using robustness parameter

Publications (1)

Publication Number Publication Date
US20040120544A1 true US20040120544A1 (en) 2004-06-24

Family

ID=32263699

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/659,037 Abandoned US20040120544A1 (en) 2002-09-10 2003-09-09 Digital-watermark embedding method and device and storage medium for storing the method
US11/740,770 Expired - Fee Related US7386149B2 (en) 2002-09-10 2007-04-26 Method and apparatus for embedding digital-watermark using robustness parameter

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/740,770 Expired - Fee Related US7386149B2 (en) 2002-09-10 2007-04-26 Method and apparatus for embedding digital-watermark using robustness parameter

Country Status (2)

Country Link
US (2) US20040120544A1 (en)
JP (1) JP2004104494A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080037037A1 (en) * 2006-08-09 2008-02-14 Canon Kabushiki Kaisha Image processing apparatus and method
US20080222462A1 (en) * 2006-12-15 2008-09-11 Canon Kabushiki Kaisha Image forming system, image processing apparatus, determination device, and image processing method
US20090190182A1 (en) * 2008-01-29 2009-07-30 Ricoh Company, Ltd. Apparatus, system, and method for image processing
US20110161086A1 (en) * 2009-11-04 2011-06-30 Rodriguez Tony F Orchestrated Encoding and Decoding
US20110235084A1 (en) * 2010-03-29 2011-09-29 Kabushiki Kaisha Toshiba Image forming apparatus comprising pattern adding function
US20150036873A1 (en) * 2005-04-26 2015-02-05 Verance Corporation Circumvention of watermark analysis in a host content
WO2015028098A1 (en) * 2013-09-02 2015-03-05 Centum Research & Technology S.L.U. Method and system for embedding information and authenticating a h.264 video using a digital watermark
US9189955B2 (en) 2000-02-16 2015-11-17 Verance Corporation Remote control signaling using audio watermarks
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9596521B2 (en) 2014-03-13 2017-03-14 Verance Corporation Interactive content acquisition using embedded codes
US20170076416A1 (en) * 2015-09-16 2017-03-16 Institute For Information Industry Method and device for picture-based barcode encoding and decoding
US20220294931A1 (en) * 2021-03-11 2022-09-15 Canon Kabushiki Kaisha Information processing apparatus, image processing method, and medium
US20220294934A1 (en) * 2021-03-11 2022-09-15 Canon Kabushiki Kaisha Information processing apparatus, image processing method, and medium
US11691434B2 (en) 2020-09-29 2023-07-04 Canon Kabushiki Kaisha Apparatus and method

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006033755A (en) * 2004-07-21 2006-02-02 Fuji Xerox Co Ltd Image processing apparatus
JP4740581B2 (en) * 2004-12-06 2011-08-03 日本放送協会 Analog digital watermark embedding device and program thereof, and analog digital watermark detection device and program thereof
WO2006074219A2 (en) * 2005-01-03 2006-07-13 Mak Acquisitions Llc System and method for data hiding using inter-word space modulation
JP4613807B2 (en) * 2005-11-25 2011-01-19 富士ゼロックス株式会社 Document processing apparatus and document processing method
JP2008225232A (en) * 2007-03-14 2008-09-25 Crimson Technology Inc Signal processing method and audio content distribution method
JP4928998B2 (en) 2007-03-16 2012-05-09 株式会社リコー Image forming apparatus and image forming method
US8315424B2 (en) 2007-03-19 2012-11-20 Ricoh Company, Ltd. Image processing apparatus, image processing method, and program product
JP4956363B2 (en) * 2007-10-10 2012-06-20 キヤノン株式会社 Information processing apparatus and control method thereof
US7974437B2 (en) * 2007-11-19 2011-07-05 Seiko Epson Corporation Identifying steganographic data in an image
US8081823B2 (en) * 2007-11-20 2011-12-20 Seiko Epson Corporation Segmenting a string using similarity values
US8031905B2 (en) * 2007-11-21 2011-10-04 Seiko Epson Corporation Extracting data from images
US8243981B2 (en) * 2007-11-26 2012-08-14 Seiko Epson Corporation Identifying embedded data in an image
US8009862B2 (en) * 2007-11-27 2011-08-30 Seiko Epson Corporation Embedding data in images
JP4942633B2 (en) * 2007-12-21 2012-05-30 三菱電機株式会社 Digital watermarking system
JP4587058B2 (en) * 2008-09-10 2010-11-24 富士ゼロックス株式会社 Image processing apparatus, image processing system, and program
JP2010074436A (en) * 2008-09-17 2010-04-02 Ricoh Co Ltd Image processing apparatus, image processing method, and image processing program
WO2010091208A1 (en) * 2009-02-04 2010-08-12 William Charles Fisher Digital watermarking system and method
US8275168B2 (en) * 2009-08-28 2012-09-25 Seiko Epson Corporation Orientation free watermarking message decoding from document scans
CN102147912B (en) * 2011-03-30 2013-12-04 北京航空航天大学 Adaptive difference expansion-based reversible image watermarking method
US8189861B1 (en) * 2011-04-05 2012-05-29 Google Inc. Watermarking digital documents
US9075961B2 (en) * 2013-09-10 2015-07-07 Crimsonlogic Pte Ltd Method and system for embedding data in a text document

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5861619A (en) * 1995-12-28 1999-01-19 Oki Electric Industry Co., Ltd. Method of and apparatus for embedding data into an electronic document by modulating spaces between words
US6246775B1 (en) * 1997-09-17 2001-06-12 Pioneer Electronic Corporation Method and appartus for superposing a digital watermark and method and apparatus for detecting a digital watermark
US6898297B2 (en) * 2000-06-20 2005-05-24 Matsushita Electric Industrial Co., Ltd. Digital watermark embedding method, digital watermark extracting method, recording medium, image recording device, and image replaying device

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3272842B2 (en) * 1992-12-17 2002-04-08 ゼロックス・コーポレーション Processor-based decision method
US5761686A (en) * 1996-06-27 1998-06-02 Xerox Corporation Embedding encoded information in an iconic version of a text image
US6731775B1 (en) * 1998-08-18 2004-05-04 Seiko Epson Corporation Data embedding and extraction techniques for documents
JP3373811B2 (en) * 1999-08-06 2003-02-04 インターナショナル・ビジネス・マシーンズ・コーポレーション Method and apparatus for embedding and detecting watermark information in black and white binary document image
GB9923212D0 (en) * 1999-10-02 1999-12-08 Central Research Lab Ltd Apparatus for, and method of, encoding code into and decoding code from a series of stored images
JP2003259112A (en) * 2001-12-25 2003-09-12 Canon Inc Watermark information extracting device and its control method
JP2004023565A (en) * 2002-06-18 2004-01-22 Canon Inc Electronic watermark burying apparatus, electronic watermark extracting apparatuses, and method thereof
JP4194462B2 (en) * 2002-11-12 2008-12-10 キヤノン株式会社 Digital watermark embedding method, digital watermark embedding apparatus, program for realizing them, and computer-readable storage medium
JP2004193756A (en) * 2002-12-09 2004-07-08 Canon Inc Electronic watermark embedding method
JP3919656B2 (en) * 2002-12-09 2007-05-30 キヤノン株式会社 Digital watermark embedding device, digital watermark embedding method, digital watermark extraction device, digital watermark extraction method
JP2004334339A (en) * 2003-04-30 2004-11-25 Canon Inc Information processor, information processing method, and storage medium, and program
US7245740B2 (en) * 2003-07-01 2007-07-17 Oki Electric Industry Co., Ltd. Electronic watermark embedding device, electronic watermark detection device, electronic watermark embedding method, and electronic watermark detection method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5861619A (en) * 1995-12-28 1999-01-19 Oki Electric Industry Co., Ltd. Method of and apparatus for embedding data into an electronic document by modulating spaces between words
US6246775B1 (en) * 1997-09-17 2001-06-12 Pioneer Electronic Corporation Method and appartus for superposing a digital watermark and method and apparatus for detecting a digital watermark
US6898297B2 (en) * 2000-06-20 2005-05-24 Matsushita Electric Industrial Co., Ltd. Digital watermark embedding method, digital watermark extracting method, recording medium, image recording device, and image replaying device

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9189955B2 (en) 2000-02-16 2015-11-17 Verance Corporation Remote control signaling using audio watermarks
US9153006B2 (en) * 2005-04-26 2015-10-06 Verance Corporation Circumvention of watermark analysis in a host content
US20150036873A1 (en) * 2005-04-26 2015-02-05 Verance Corporation Circumvention of watermark analysis in a host content
US20080037037A1 (en) * 2006-08-09 2008-02-14 Canon Kabushiki Kaisha Image processing apparatus and method
US8482805B2 (en) 2006-08-09 2013-07-09 Canon Kabushiki Kaisha Embedding data in a print image
US20080222462A1 (en) * 2006-12-15 2008-09-11 Canon Kabushiki Kaisha Image forming system, image processing apparatus, determination device, and image processing method
US7818652B2 (en) 2006-12-15 2010-10-19 Canon Kabushiki Kaisha Image forming system, image processing apparatus, determination device, and image processing method
US8208179B2 (en) * 2008-01-29 2012-06-26 Ricoh Company, Ltd. Apparatus, system, and method for image processing
EP2086215A1 (en) 2008-01-29 2009-08-05 Ricoh Company, Ltd. Apparatus, system, and method for determining the embeddability of supplemental information into an image
US20090190182A1 (en) * 2008-01-29 2009-07-30 Ricoh Company, Ltd. Apparatus, system, and method for image processing
US8548810B2 (en) * 2009-11-04 2013-10-01 Digimarc Corporation Orchestrated encoding and decoding multimedia content having plural digital watermarks
US20140114666A1 (en) * 2009-11-04 2014-04-24 Digimarc Corporation Orchestrated encoding and decoding
US20110161086A1 (en) * 2009-11-04 2011-06-30 Rodriguez Tony F Orchestrated Encoding and Decoding
US9412386B2 (en) * 2009-11-04 2016-08-09 Digimarc Corporation Orchestrated encoding and decoding
US20110235084A1 (en) * 2010-03-29 2011-09-29 Kabushiki Kaisha Toshiba Image forming apparatus comprising pattern adding function
US8446612B2 (en) * 2010-03-29 2013-05-21 Kabushiki Kaisha Toshiba Image forming apparatus comprising pattern adding function
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
WO2015028098A1 (en) * 2013-09-02 2015-03-05 Centum Research & Technology S.L.U. Method and system for embedding information and authenticating a h.264 video using a digital watermark
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
US9596521B2 (en) 2014-03-13 2017-03-14 Verance Corporation Interactive content acquisition using embedded codes
US20170076416A1 (en) * 2015-09-16 2017-03-16 Institute For Information Industry Method and device for picture-based barcode encoding and decoding
US9860415B2 (en) * 2015-09-16 2018-01-02 Institute For Information Industry Method and device for picture-based barcode encoding and decoding
US11691434B2 (en) 2020-09-29 2023-07-04 Canon Kabushiki Kaisha Apparatus and method
US20220294931A1 (en) * 2021-03-11 2022-09-15 Canon Kabushiki Kaisha Information processing apparatus, image processing method, and medium
US20220294934A1 (en) * 2021-03-11 2022-09-15 Canon Kabushiki Kaisha Information processing apparatus, image processing method, and medium
US11677894B2 (en) * 2021-03-11 2023-06-13 Canon Kabushiki Kaisha Information processing apparatus, image processing method, and medium
US11818319B2 (en) * 2021-03-11 2023-11-14 Canon Kabushiki Kaisha Information processing apparatus, image processing method, and medium

Also Published As

Publication number Publication date
US7386149B2 (en) 2008-06-10
JP2004104494A (en) 2004-04-02
US20070201099A1 (en) 2007-08-30

Similar Documents

Publication Publication Date Title
US7386149B2 (en) Method and apparatus for embedding digital-watermark using robustness parameter
US7106884B2 (en) Digital watermark embedding apparatus for document, digital watermark extraction apparatus for document, and their control method
US7536026B2 (en) Image processing apparatus and method
JP6353271B2 (en) Image processing apparatus and method
JP5118360B2 (en) Document authentication method, program, and data processing apparatus
EP1566763B1 (en) Watermarking of limited colour images
US7411702B2 (en) Method, apparatus, and computer program product for embedding digital watermark, and method, apparatus, and computer program product for extracting digital watermark
US20090021793A1 (en) Image processing device, image processing method, program for executing image processing method, and storage medium for storing program
US7613317B2 (en) Image processing apparatus, image processing method, computer program and computer readable storage medium
US7260239B2 (en) Information processing method and information processor
JP4343968B2 (en) Image forming apparatus and method
JP2004140764A (en) Image processing device and method therefor
US7116826B2 (en) Embedding with error-correction encoding
US8542867B2 (en) Image processing for reproducing code image from original information
US7209572B2 (en) Digital watermark embedding apparatus, digital watermark extraction apparatus, and methods thereof
US6753979B2 (en) Data processing apparatus and method, and storage medium
US7260238B2 (en) Digital watermark embedding method, apparatus, digital watermark extraction method and apparatus
JP2011139449A (en) Method and system for embedding messages into structure shapes
US20050063018A1 (en) Image processor unit, image processing method, and storage medium
JP4006145B2 (en) Image processing apparatus, image processing method, and storage medium
JP4164458B2 (en) Information processing apparatus and method, computer program, and computer-readable storage medium
JP2007166227A (en) Apparatus, method and program for image processing
JP2002354233A (en) Method and device for picture size reduction and storage medium
JP3809356B2 (en) Image processing apparatus and method, computer program, and recording medium
Samra A new model for data hiding in binary documents

Legal Events

Date Code Title Description
AS Assignment

Owner name: CANON KABUSHIKI KAISHA, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:EGUCHI, TAKAMI;IWAMURA, KEIICHI;REEL/FRAME:014483/0001

Effective date: 20030901

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION