中文水印字库的自动生成方法
Automatic generation of Chinese document watermarking fonts
- 2022年27卷第1期 页码:262-276
纸质出版日期: 2022-01-16 ,
录用日期: 2021-02-11
DOI: 10.11834/jig.200695
移动端阅览
浏览全部资源
扫码关注微信
纸质出版日期: 2022-01-16 ,
录用日期: 2021-02-11
移动端阅览
孙杉, 张卫明, 方涵, 俞能海. 中文水印字库的自动生成方法[J]. 中国图象图形学报, 2022,27(1):262-276.
Shan Sun, Weiming Zhang, Han Fang, Nenghai Yu. Automatic generation of Chinese document watermarking fonts[J]. Journal of Image and Graphics, 2022,27(1):262-276.
目的
2
文档水印技术是一种用以解决文档泄密溯源的信息隐藏技术。传统的基于字库的文档水印方案需要手动生成字库,极大地影响了水印的使用效率。为此本文设计了一种基于自动生成字库的鲁棒文档水印方案。
方法
2
该方法由一个端到端的编码—解码器结构的自动字库生成网络、一个字符筛选嵌入端和一个神经网络提取端组成,可自动完成变形字库的生成,而后进行水印的嵌入和提取。为了抵抗传输过程中可能存在的失真,在编码器和解码器之间加入可导噪声层用以模拟失真过程,使得水印模型获得对应的鲁棒性。
结果
2
本文方法在含252个中文字符的真实文档中嵌入252 bit水印信息,与其他文档水印方法的视觉质量和鲁棒性进行了对比。结果表明,相对于现有的基于字符特征的中文文档水印方法,本文方法的峰值信噪比(peak signal to noise ratio,PSNR)、结构相似性(structural similarity,SSIM)和主观质量评分分别提升了11.68 dB、0.08和5.8 %,说明其有更好的视觉质量。对于数字信道传输场景,本文方法达到了与其他方法大致相当的性能;对于打印扫描场景,本文方法在三号、四号、小四号和五号字体下的水印提取率分别提升了2.4 %、3.07 %、1.34 %和0.02 %,在打印、扫描分辨率失配的场景下也具有较好性能,说明其在抗打印扫描上具有更高的鲁棒性。
结论
2
与基于人工设计字库的中文字符水印相比,本文方法充分利用了字符的几何特征并且能够自动生成字库,降低了中文文档水印方案的复杂度。
Objective
2
The copyright protection has been the hotspot with the amount of digital documents increased dramatically. In order to protect the document copyright and locate the source of the leaked document
watermarking technology innovation for documents has been widely focused on. The protection can be realized via adding invisible digital watermark information (e.g.
device number
date
etc.) to the document. To realize the traceability of document leakage
the leaked source can be located by extracting the watermark from the document once the watermarked document is leaked. Meanwhile
the current watermarking technology can also act as a deterrent which effectively reduce the occurrence of the leaking events. The current document watermarking methods can be divided into five categories: document structure based methods
natural language processing based methods
grid pattern based methods
image based methods and font based methods. Among them
the font based methods guarantee the best performance in the view of robustness and transparency. The main idea of such methods is representing the watermark information into the characteristics of the fonts (e.g.
the size
shape or brightness) while the modified fonts maintain the high visual consistency with the original one. The robustness
transparency
capacity as well as the integrity can be achieved simultaneously. However
the existing font based methods need to design the modification features manually
and cannot automatically generate the new fonts. For the Chinese character system which contains a large number of characters
such methods will cause a labor cost workload and severely less efficiency. To overcome such drawbacks
this research proposes an automatic font generation based robust document watermarking scheme.
Method
2
The framework of such scheme is comprised of an end-to-end encoder-decoder structure automatic font generation network
a character selection embedder and a neural network based extractor. With the designed font generation network
the deformed font library is further utilized for embedding the watermark generated automatically. Meanwhile
a differentiable noise layer is complemented between the encoder and the decoder to simulate the distortion process in order to realize the robustness against different distortions
so that the encoder can learn better features to create the new font and the decoder can be trained to be adaptive to such distortions. This research designs a combined noise layer that can effectively simulate the common distortions via the common distortions in digital transmission channels (e.g.
screenshots
scaling
Gaussian noise and JPEG compression). The whole font generation network consists of four parts: encoder
noise layer
decoder and adversarial recognizer. The encoder receives the watermark information and the carrier character image to generate the encoded character image. The noise layer adds noise to the encoded image to generate the noisy image. In particular
several of six simulated noise layers (identity mapping layer
scaling layer
translation layer
rotation layer
Gaussian noise layer and Gaussian blur layer) are randomly opted as a combined noise layer at each iteraction. The decoder receives the noisy image and outputs the corresponding watermark label. The adversarial recognizer tries to detect whether the current image is a carrier character image or an encoded one
which aids to improve the visual quality of the generated font. The encoder provides training samples for the extractor to ensure better extraction performance
and the extractor guides the generation direction of encoder to create better character images. The two coordinated modules make the generated font with higher visual quality and stronger robustness. Based on the well trained font generation
the network has generated the watermarked font library via feeding them with an original font library and different watermark signal. Each character in the font library can corresponds to different perturbation
which can be decoded to different watermark signal further. Hence
based on the generated font library
the corresponding character in the codebook is sorted out in the watermark embedding stage according to the current watermark information to replace the current character in the input document. The watermark information can be embedded into the whole original document and generate the watermarked document in this way. In the extraction stage
the whole document is firstly divided into some single character images by character segmentation after receiving the distorted watermarked document transmitted with digital channel. Each character is sent to the pre-trained decoder in the watermarking generation stage. The watermark information embedded in the current character can be accurately extracted. The characters in the document undergo the transformation distortion from digital signal to analog signal (A-D) process and from analog signal to digital signal (D-A) process
and the image quality is greatly reduced in the context of the print-scan scene. Simultaneously
such process that contained various image attacks cannot be accurately simulated by differentiable distortions
so the robustness against print-scanning distortions should be considered as a target. To achieve such robustness
this proposal is a fine-tuning scheme for the extractor which can effectively train the extractor to be adaptive to the print-scanning distortions. Specifically
the font generation model is fixed as a pre-training network and a set of following documents are embedded with watermarks based on the pre-trained embedder. The real print-scanning process is conducted on such documents to generate the distorted image library. Based on the distorted image and its watermark
the decoder is fine-tuned to be adaptive to the distorted features further. The robustness against print-scanning distortion can be achieved.
Result
2
This scheme embeds 252 bits of watermark into a real document containing 252 Chinese characters in comparison of the visual quality and robustness with other document watermarking methods. The results show that the peak signal to noise ratio(PSNR)
structural similarity(SSIM) and subjective quality scores of the proposed scheme are higher with 11.68 dB
0.08 and 5.8 % respectively
demonstrating the qualified visual quality of the proposed scheme. For the robustness
the watermark extraction rate of the scheme is 100 % under the screenshot and scaling
and the performance under JPEG compression and Gaussian noise is approximately equivalent to that of other methods. For the print-scan scene
the watermark extraction rates of the scheme in the font size of three
four
small four and five are realized 2.4 %
3.07 %
1.34 % and 0.02 %
respectively. The qualified performance is achieved under different mismatched printing and scanning qualities as well
which indicates that the scheme has higher robustness in resisting the print-scanning distortions.
Conclusion
2
Compared with the existing Chinese character watermarking methods based on the manually designed font library
the proposed scheme can automatically generate the tagged Chinese font library that is similar to the target font visually
which effectively reduces the complexity of the font generation. The experimental results show that the proposed document watermarking scheme has presented better visual quality and embedding capacity. In addition
the proposed scheme maintains the strong robustness against digital editing channel as well as the print-scanning channel. However
the scheme is not suitable yet for print-shooting and screen-shooting process at present. Future research will be concentrated on how to design robust document watermarking schemes for these two scenes.
文档水印深度学习中文字库生成抗数字失真抗打印扫描
document watermarkingdeep learningChinese font generationanti digital distortionanti print-scanning distortion
Ai P. 2014. Research of Text Watermarking Algorithm to Resist Printing and Scanning. Xi′an: Xidian University
艾平. 2014. 抗打印扫描文本水印算法研究. 西安: 西安电子科技大学
Atallah M J, Raskin V, Crogan M, Hempelmann C, Kerschbaum F, Mohamed D and Naik S. 2001. Natural language watermarking: design, analysis, and a proof-of-concept implementation//Proceedings of the 4th International Workshop on Information Hiding. Pittsburgh, USA: Springer-Verlag: 185-199 [DOI: 10.1007/3-540-45496-9_14http://dx.doi.org/10.1007/3-540-45496-9_14]
Brassil J, Low S, Maxemchuk N and O'Gorman L. 1995. Hiding information in document images//Proceedings of the 29th Annual Conference on Information Sciences and Systems. Baltimore, USA: Johns Hopkins University: 482-489
Brassil J T, Low S and Maxemchuk N F. 1999. Copyright protection for theelectronic distribution of text documents. Proceedings of the IEEE, 87(7): 1181-1196 [DOI: 10.1109/5.771071]
Briffa J A, Culnane C and Treharne H. 2010. Imperceptible printer dot watermarking for binary documents//Proceedings Volume 7723, Optics, Photonics, and Digital Technologies for Multimedia Applications. Brussels, Belgium: SPIE: 77230M [DOI: 10.1117/12.854708http://dx.doi.org/10.1117/12.854708]
Campbell N D F and Kautz J. 2014. Learning a manifold of fonts. ACM Transactions on Graphics, 33(4): #91 [DOI: 10.1145/2601097.2601212]
Chen Y, Li Z, Zhang J and Wang G M. 2019. Robust watermarking algorithm for diffusion weighted images. Journal of Image and Graphics, 24(9): 1434-1449
陈怡, 李智, 张健, 王国美. 2019. 弥散加权图像的鲁棒水印算法研究. 中国图象图形学报, 24(9): 1434-1449 [DOI: 10.11834/jig.180672]
Deng X H, Chen Z G and Mao Y M. 2014. Lossless watermarking algorithm for medical image's tamper detection and recovery with high quality. Journal of Image and Graphics, 19(4): 583-591
邓小鸿, 陈志刚, 毛伊敏. 2014. 基于无损水印的医学图像篡改检测和高质量恢复. 中国图象图形学报, 19(4): 583-591 [DOI: 10.11834/jig.20140413]
Fang H, Zhang W M, Zhou H, Cui H and Yu N H. 2019. Screen-shooting resilient watermarking. IEEE Transactions on Information Forensics and Security, 14(6): 1403-1418 [DOI: 10.1109/TIFS.2018.2878541]
Hii A J H, Hann C E, Chase J G and Van Houten E E W. 2006. Fast normalized cross correlation for motion tracking using basis functions. Computer Methods and Programs in Biomedicine, 82(2): 144-156 [DOI: 10.1016/j.cmpb.2006.02.007]
Huang D and Yan H. 2001. Interword distance changes represented by sine waves for watermarking text images. IEEE Transactions on Circuits and Systems for Video Technology, 11(12): 1237-1245 [DOI: 10.1109/76.974678]
Isola P, Zhu J Y, Zhou T H and Efros A A. 2017. Image-to-image translation with conditional adversarial networks//Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Honolulu, USA: IEEE: 5967-5976 [DOI: 10.1109/CVPR.2017.632http://dx.doi.org/10.1109/CVPR.2017.632]
Kelkoul H, Zaz Y, Tribak H and Schaefer G. 2018. A robust combined audio and video watermark algorithm against cinema piracy//Proceedings of the 6th International Conference on Multimedia Computing and Systems (ICMCS). Rabat, Morocco: IEEE: 1-4 [DOI: 10.1109/ICMCS.2018.8525979http://dx.doi.org/10.1109/ICMCS.2018.8525979]
Li S Z, Zhang X, Deng X H and Wu X Y. 2015. Reversible video watermarking algorithm for H. 264/AVC based on mode feature. Journal of Image and Graphics, 20(10): 1285-1296
李淑芝, 张翔, 邓小鸿, 吴晓燕. 2015. 基于模式特征的H. 264/AVC可逆视频水印. 中国图象图形学报, 20(10): 1285-1296 [DOI: 10.11834/jig.20151001]
Liu D, Sun M and Zhou M T. 2007. A text digital watermarking technology based on graph theory. Journal of Computer Research and Development, 44(10): 1757-1764
刘东, 孙明, 周明天. 2007. 基于图论的文本数字水印技术. 计算机研究与发展, 44(10): 1757-1764
Qi W F, Guo W, Zhang T, Liu Y X, Guo Z M and Fang X F. 2019. Robust authentication for paper-based text documents based on text watermarking technology. Mathematical Biosciences and Engineering, 16(4): 2233-2249 [DOI: 10.3934/mbe.2019110]
Qi W F, Li X L, Yang B and Cheng D F. 2008. Document watermarking scheme for information tracking. Journal on Communications, 29(10): 183-190
亓文法, 李晓龙, 杨斌, 程道放. 2008. 用于信息追踪的文本水印算法. 通信学报, 29(10): 183-190 [DOI: 10.3321/j.issn:1000-436X.2008.10.026]
Su Q T and Chen B J. 2018. Robust color image watermarking technique in the spatial domain. Soft Computing, 22(1): 91-106 [DOI: 10.1007/s00500-017-2489-7]
Suzaki M and Suto M. 2005. A watermark embedding and extracting method for printed documents. Electronics and Communications in Japan (Part Ⅲ: Fundamental Electronic Science), 88(7): 43-51 [DOI: 10.1002/ecjc.20142]
Takahashi Y, Yamada T, Ebisawa R, Fujii Y and Tezuka S. 2008. Information embedding method for home printing of certifications//Proceedings of the 10th International Conference on Advanced Communication Technology. Gangwon, Korea (South): IEEE: 2116-2120 [DOI: 10.1109/ICACT.2008.4494206http://dx.doi.org/10.1109/ICACT.2008.4494206]
Wu M and Liu B D. 2004. Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia, 6(4): 528-538 [DOI: 10.1109/TMM.2004.830814]
Xiao C, Zhang C and Zheng C X. 2018. FontCode: embedding information in text documents using glyph perturbation. ACM Transactions on Graphics, 37(2): #15 [DOI: 10.1145/3152823]
Zhang Y, Liu T, Chen Y H, Zhao S Q and Li S. 2005. Natural Language Watermarking. Journal of Chinese Information Processing, 19(1): 56-62, 70
张宇, 刘挺, 陈毅恒, 赵世奇, 李生. 2005. 自然语言文本水印. 中文信息学报, 19(1): 56-62, 70 [DOI: 10.3969/j.issn.1003-0077.2005.01.009]
相关作者
相关机构