WO2006109866A1 - Image processing device, image processing method, program for executing image processing method, and storage medium for storing program - Google Patents

Image processing device, image processing method, program for executing image processing method, and storage medium for storing program Download PDF

Info

Publication number
WO2006109866A1
WO2006109866A1 PCT/JP2006/307888 JP2006307888W WO2006109866A1 WO 2006109866 A1 WO2006109866 A1 WO 2006109866A1 JP 2006307888 W JP2006307888 W JP 2006307888W WO 2006109866 A1 WO2006109866 A1 WO 2006109866A1
Authority
WO
WIPO (PCT)
Prior art keywords
image
character
watermark message
dot pattern
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2006/307888
Other languages
English (en)
French (fr)
Inventor
Ling Lu
Kitahiro Kaneda
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Canon Inc
Original Assignee
Canon Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Canon Inc filed Critical Canon Inc
Priority to US11/815,893 priority Critical patent/US20090021793A1/en
Priority to CN2006800119974A priority patent/CN101160950B/zh
Publication of WO2006109866A1 publication Critical patent/WO2006109866A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/387Composing, repositioning or otherwise geometrically modifying originals
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0062Embedding of the watermark in text images, e.g. watermarking text documents using letter skew, letter distance or row distance

Definitions

  • the present invention relates to a technique for embedding the message to a document image and extracting the embedded message.
  • the watermark message having such a function there is an invisible digital watermark, which is acquired by invisibly embedding the access control information to the printed material.
  • a method of the type of embedding message by controlling an amount of spaces in an English word string for example, United States Patent No. 6,086,706
  • a method of the type of rotating a character for example, United States Patent No. 6,086,706
  • a method of the type of enlarging and reducing the size of a character a method of the type of embedding message as deforming a character, and the like.
  • the present invention has been completed in consideration of the above point, and an object thereof is to provide image processing device and method which can achieve embedding and extracting of watermark message which secures certain or more message embedding accuracy and amount as suppressing deterioration of quality in an original document image.
  • the present invention is characterized by an image processing device which comprises an image input unit adapted to input a document image, an extraction unit adapted to extract a character image included in the input document image, and an embedding unit adapted to embed watermark message by constituting the character image by means of a predetermined dot pattern. Further, the present invention is characterized by an image processing device which comprises an image input unit adapted to input a watermarked document image, an acquisition unit adapted to acquire dot pattern information indicating a dot pattern constituting a character image included in the input document image, and an extraction unit adapted to extract the watermark message based on the acquired dot pattern information.
  • the present invention is characterized by an image processing method which comprises an image input step of inputting a document image, an extraction step of extracting a character image included in the input document image, and an embedding step of embedding watermark message by constituting the character image by means of a predetermined dot pattern.
  • the present invention is characterized by an image processing method which comprises an image input step of inputting a watermarked image, an acquisition step of acquiring dot pattern information indicating a dot pattern constituting a character image included in the input document image, and an extraction step of extracting the watermark message based on the acquired dot pattern information.
  • Fig. 1 is a block diagram showing the constitution of the watermark message embedding device according to the present invention
  • Fig. 2 is a block diagram showing the electronic configuration of the watermark message embedding device and the watermark message extraction device according to the present invention
  • Fig. 3 is a flow chart for explaining the operation procedure of the watermark message embedding device according to the first embodiment
  • Fig. 4 is a block diagram for explaining the changes of a character before and after the embedding of the watermark message according to the first embodiment
  • Fig. 5 is a flow chart for explaining the watermark message embedding method according to the first embodiment
  • Figs. 6A and 6B are flow charts showing the process of the step S306 in the first embodiment
  • Figs. 7A, 7B and 7C are diagrams for explaining the states before and after the embedding of the watermark message according to the first embodiment
  • Fig. 8 is a block diagram showing the constitution of the watermark message extraction device according to the present invention
  • Fig. 9 is a flow chart for explaining the operation procedure of the watermark message extraction device according to the first embodiment
  • Fig. 10 is a flow chart for explaining the watermark message extraction method according to the first embodiment
  • Fig. 11 is a flow chart for explaining the method of calculating the similarity according to the first embodiment
  • Fig. 12 is a diagram for explaining the changes of a character before and after the embedding of the watermark message according to the modification 1 of the first embodiment
  • Fig. 13 is a flow chart showing the process of the step S306 in the modification 1 of the first embodiment
  • Fig. 14 is a flow chart showing the process of the step S306f in the modification 1 of the first embodiment
  • Fig. 15 is a diagram for explaining the flow of the watermark message embedding in the modification 1 of the first embodiment
  • Fig. 16 is a diagram showing the operator expression for detecting the feature point in the modification 1 of the first embodiment
  • Fig. 17 is a flow chart for explaining the operation procedure of the watermark message embedding device according to the modification 2 of. the first embodiment
  • Fig. 18 is a block diagram for explaining the changes of a character before and after the embedding of the watermark message according to the modification 2 of the first embodiment
  • Fig. 19 is a flow chart for explaining the operation procedure of the watermark message extraction device according to the modification 2 of the first embodiment
  • Fig. 20 is a diagram for explaining a size change of the pattern for extracting the watermark message in the second embodiment
  • Fig. 21 is a flow chart for explaining the step S805 in the second embodiment
  • Fig. 22 is a flow chart for explaining the step S805f in the second embodiment
  • Fig. 23 is a diagram for explaining the nearest neighbor method
  • Fig. 24 is a diagram for explaining the linear interpolation method
  • Fig. 25 is a flow chart for explaining the step S805fl in the modification 1 of the second embodiment
  • Fig. 26 is a flow chart for explaining the angle adjustment of a document image in the third embodiment
  • Fig. 27 is a diagram for explaining the fine adjustment of an input image in the third embodiment
  • Fig. 28 is a flow chart for explaining the step S302b in the third embodiment.
  • Fig. 29 is a diagram for explaining the document image after the angle adjustment in the third embodiment.
  • Fig. 30 is a flow chart for explaining the step S302 in the modification 1 of the third embodiment.
  • Fig. 31 is a flow chart for explaining the step S302a in the modification 2 of the third embodiment.
  • Fig. 1 is a block diagram showing the constitution of the watermark message embedding device according to the present invention.
  • a document image 100 to which watermark message should be embedded is first input to an image input unit 101, and the positional relation of the characters in the input document image 100 is analyzed in a document analysis unit 102. Further, an embedding judgment unit 103 judges it whether or not a watermark message can be embedded in the document image 100. Then, in an embedding unit 106, the watermark message is actually embedded in the document image 100 based on watermark message 104 input through a watermark message input unit 105.
  • the image in which the digital watermark has been embedded is called a watermarked image.
  • a watermarked image 108 is output by an image output unit 107.
  • Fig. 2 is a block diagram showing the electronic configuration of the watermark message embedding device and the watermark message extraction device according to the present invention.
  • a computer 201 which is the general-purpose information processing device such as a popular personal computer or the like, can input the image data representing the image read by an image input device 217 such as a scanner or the like (for convenience, image input device 217 can be also called scanner 217 hereinafter) , process the input image data, and store the processed image data.
  • a printer 216 can print the image data acquired by the image input device 217.
  • various indications and the like from a user are input by the user' s input operation through a mouse 213 and a keyboard 214.
  • various blocks are mutually connected through the bus to as to be able to exchange various data.
  • a CPU 202 can control the operations of the respective blocks included in the computer 201, and also execute the programs stored in the computer 201.
  • a main memory unit 203 consisting of a RAM is the device which temporarily stores the programs and the process-target image data for the process to be executed in the CPU 202, and an HDD (hard disk drive) 204 is the device which can previously store the programs and the image data to be transferred to the main memory unit 203 or the like and further store the image data after the process.
  • a scanner I/F (interface) 215 is the interface which is connected to the scanner 217 of reading an original, a film and the like and generating the corresponding image data, and can input the image data from the scanner 217.
  • a printer I/F 208 is the interface, which is connected to the printer 216 of printing the image data, and can transmit to the printer 126 the image data to be printed.
  • a CD drive 209 is the device capable of reading and writing the data from and to a CD (CD-R/CD-RW) being one of external storage media.
  • An FDD Frequency Division Duplex
  • a DVD (digital versatile disc) drive 210 is the device, as well as the FDD 211, capable of reading and writing the data from and to a DVD.
  • the program such as an image processing program, a printer driver or the like has been stored in a CD, an FDD, a DVD or the like, the relevant program is once installed onto the HDD 204, and the installed program or driver is then transferred to the main memory unit 203 according to need.
  • An I/F 212 is the interface, which is connected to the mouse 213 and the keyboard 214 so as to accept the indications input therefrom.
  • a monitor 206 is the display device capable of displaying the results, passages and the like of the watermark message embedding and extraction processes, and a video controller 205 is the device for transmitting the display data to the monitor 206.
  • the present invention is applicable to the system, which is constituted by plural devices (e.g., a host computer, an interface device, a reader, a printer, and the like) , or to the device, which comprises a single unit (e.g., a copying machine, a facsimile machine, or the like) .
  • the program is loaded to the main memory unit 203 and executed by the CPU 202 in response to the indication from the mouse 213 or the keyboard 214, the computer 201 functions as the watermark message embedding device or the watermark message extraction device.
  • the user can see the execution progress and the result of the watermark message embedding and extraction processes, through the monitor 206.
  • Fig. 3 is a flow chart for explaining the operation procedure of the watermark message embedding device according to the present embodiment.
  • the original document image 100 to which the watermark message is to be embedded is input to the document analysis unit 102 through the image input unit 101.
  • the image data input through the scanner 217 or the like and extracted into the bitmap data or if the electronic data is generated by using the document processing application program the acquired electronic data can be used as the document image 100.
  • a circumscribed rectangle i.e., character region
  • the circumscribed rectangle of a character is the rectangle, which is externally in contact with the relevant character, and the circumscribed rectangle originally implies the information indicating the region to which character recognition is executed.
  • the circumscribed rectangle represents the character region to which the embedding operation is executed. More specifically, each pixel value in the document image is projected in regard to the vertical coordinate axis, the row is discriminated by searching a blank, portion (that is, the portion not including a character being the black portion) , and the discriminated row is divided. After then, the document image is projected in regard to the horizontal coordinate axis in units of divided row, and the acquired image is further divided in units of character similarly by searching the blank portion, whereby each character is cut out with the circumscribed rectangle thereof.
  • the watermark message 104 that the user wishes to embed is input from the watermark message input unit 105.
  • the watermark message 104 may be input through the keyboard 214 or selected from among those previously stored in the memory unit .
  • a step S304 one character is input.
  • a step S305 it is judged by the embedding judgment unit 103, before the watermark message is actually embedded, whether or not the relevant watermark message can be embedded in the input character in the region of the circumscribed rectangle.
  • the process in the step S305 only the character of which the size is larger than the region which has been previously determined so that the watermark message can be extracted therefrom even if scanning is executed is selected. That is, too small character, symbol and the like are excluded from the embedding target.
  • step S305 If it is judged that the watermark message cannot be embedded in the input character (NO in step S305), the flow returns to the step S304 to input next one character. Meanwhile, if it is judged that the watermark message can be embedded in the input character (YES in step S305) , the flow advances to a step S306 to cause the embedding unit 106 to embed the watermark message.
  • the method which is executed by the embedding unit 106 to embed the watermark message will be explained. That is, in the relevant method, two different patterns are prepared, and the watermark message is embedded in the character by using these patterns respectively. For example, if watermark message ⁇ V l" is embedded in the character, the character is constituted by using a pattern "1" denoted by numeral 605 shown in Fig. 4. Moreover, if watermark message "0" is embedded in the character, the character is constituted by using a pattern "0" denoted by numeral 604 shown in Fig. 4.
  • Fig. 4 is the block diagram for explaining the changes of the character before and after the embedding of the watermark message according to the present embodiment .
  • numeral 601 denotes the character before the embedding of the watermark message (that is, the watermark message is not embedded in the character 601)
  • numeral 602 denotes the character which is acquired after the watermark message "0" was embedded in the character 601 by using the pattern "0”
  • numeral 603 denotes the character which is acquired after the watermark message "1" was embedded in the character 601 by using the pattern "1”. That is, the watermark message is embedded by constituting the character with use of the pattern "0" (604) and the pattern "1" (605) .
  • Fig. 5 is a flow chart for explaining the watermark message embedding method according to the present embodiment.
  • the bits to be embedded are selected from the watermark message 104.
  • one-bit message is embedded in one character in the present embodiment.
  • the bit to be first selected is the head bit "1"
  • the bit to be next selected is the bit "0".
  • step S30 ⁇ b it is judged whether or not the bit of the watermark message to be embedded is
  • step S306b If it is judged in the step S306b that the bit of the watermark message to be embedded is "1" (YES in step S306b) , the flow advances to a step S306c to constitute the character by using the pattern "1".
  • step S306c the detail of the process in the step S306c will be explained with reference to a flow chart shown in Fig. 6A.
  • Fig. 6A is the flow chart for explaining the method of constituting the character by using the pattern "1".
  • the coordinates of the character in which the watermark message is embedded are acquired.
  • the character coordinates are the coordinates of the circumscribed rectangle of the character acquired in the step S302.
  • a step S306c2 the pattern "1" is selected.
  • the circumscribed rectangular region of the character is divided into the region of which the size is equivalent to that of the pattern "1”, and the dot of the circumscribed rectangular region of the character and the dot of the dot pattern "1" are compared with each other for each of the divided circumscribed rectangular region of the character. Consequently, if the dot of the circumscribed rectangular region of the character (see Fig. 7A) is the black dot and the dot of the pattern "1" at the same location (see Fig. 7B) is the white dot, the black dot in the circumscribed rectangular region of the character is changed to the white dot. In other cases, any dot is not changed.
  • Fig. 7C shows the dot of the circumscribed rectangular region of the character after the above change. If the relevant process is executed to the circumscribed rectangular region of the character, the character is constituted by using the pattern "1".
  • step S306b determines whether the bit of the watermark message to be embedded is >v 0" (NO in step S306b) .
  • the flow advances to a step S306d to constitute the character by using the pattern "0".
  • step S306d the detail of the process in the step S306d will be explained with reference to a flow chart shown in Fig. 6B.
  • the flow chart shown in Fig. 6B is different from that shown in Fig. 6A only in the point that the pattern to be used in Fig. 6B is different from that to be used in Fig. 6A.
  • a step S306dl the coordinates of the character being the watermark message embedding target are acquired.
  • the pattern "0" is selected.
  • the circumscribed rectangular region of the character is divided into the region of which the size is equivalent to that of the pattern "0”, and the dot of the circumscribed rectangular region of the character and the dot of the dot pattern "0" are compared with each other for each of the divided circumscribed rectangular region of the character.
  • the black dot in the circumscribed rectangular region of the character is changed to the white dot. In other cases, any dot is not changed. If the relevant process is executed to the circumscribed rectangular region of the character, using the pattern "0" constitutes the character.
  • a step S307 it is judged whether or not the relevant character is the last character in the document image. Consequently, if it is judged that the relevant character is the last character (YES in step S307), the flow advances to a step S308 to end the embedding process of the bit of the watermark message and generate, based on the information of the pattern changed by the embedding unit 106, the watermarked image. Subsequently, the wotermarked image is output from the image output unit 107 (step S309) .
  • the watermarked image may be printed by the printer, stored as the image data in the memory unit, or transmitted to another terminal through the network.
  • the flow returns to the step S304 to input next one character.
  • Fig. 8 is a block diagram showing the constitution of the watermark message extraction device according to the present invention.
  • a watermarked document image 700 is input to an image input unit 701, and the positional relation of the characters in the input document image 700 is analyzed in a document analysis unit 702 Further, it is judged by an embedding judgment unit 703 whether or not the watermark message has been embedded in the document image 700. Then, in a watermark message extraction unit 704, the watermark message is actually extracted from the document image 700, whereby watermark message 705 is output.
  • Fig. 9 is a flow chart for explaining the operation procedure of the watermark message extraction device according to the present embodiment
  • the wartermarked document image is input. More specifically, the document image 700 from which the watermark message is to be extracted is input to the document analysis unit 702 through the image input unit 701.
  • the acquired electronic data can be used as the document image 700.
  • the acquired electronic data can be used as the document image 700.
  • a step S802 the circumscribed rectangle, i.e., the character region, is extracted from the input document image by the document analysis unit 702.
  • the process in the step S802 is the same as that in the step S302.
  • a step S803 one character is input.
  • the embedding judgment unit 703 judges it whether or not the region of the circumscribed rectangle of the input character is the region of the character in which the watermark message has been embedded.
  • step S804 If it is judged in the step S804 that the watermark message has been embedded in the input character (YES in step S804), the flow advances to a step S805 to extract the watermark message by the watermark message extraction unit 704. Meanwhile, if it is judged in the step S804 that the watermark message is not embedded in the input character (NO in step S805), the flow returns to the step S803 to input next one character.
  • step S805 will be explained with reference to a flow chart shown in Fig. 10.
  • Fig. 10 is the flow chart for explaining the watermark message extraction method according to the first embodiment.
  • the watermark message extraction target character region In the character region from which the watermark message is to be extracted (also called the watermark message extraction target character region) , it cross-correlates the character with the pattern "0" to acquire the maximum similarity MaxPO. More specifically, the pattern "0" is the pattern "0" which was used when the watermark message was embedded, and the maximum similarity acquired by cross-correlating the character with the pattern "0” is set as the maximum similarity MaxPO. Incidentally, it is assumed that the watermark message extraction target character region (from which the watermark message is to be extracted) is the region of the circumscribed rectangle of the character acquired in the step S802.
  • Fig. 11 the coordinates on a character region 1901 are set f(x, y) and the coordinates on the pattern "0" denoted by numeral 1902 are t(x, y) . Then, it calculates the similarity sequentially as shifting on the character region f(x, y) the pattern "0" t(x, y) in the X and Y directions image by image, to acquire the maximum value thereof. Thus, the maximum similarity is acquired.
  • the maximum peak appears at the location where the pattern constituting the character conforms to the pattern "0". Then, it is possible from the appeared peak to judge or discriminate that the pattern "0" has been embedded at the relevant location .
  • the similarity is expressed by the cross correlation indicated by the equation (1) .
  • the maximum peak of the similarity distribution gi(x, y) is detected, and the detected value is set the maximum similarity MaxPO (step S805a) .
  • the pattern "1" is the pattern "1" which was used when the watermark message was embedded, and the maximum similarity acquired by cross-correlating the character with the pattern "1" is set as the maximum similarity MaxPl.
  • step S805c it is judged whether or not MaxPl is larger than MaxPO. As a result, if it is judged that MaxPl is larger than MaxPO (YES in step S805c), "1" is extracted as the watermark message (step S805d) . Meanwhile, if it is judged that MaxPl is smaller than MaxPO (NO in step S805c) , "O" is extracted as the watermark message (step S805e) .
  • steps S805a and S805b it is also possible to calculate plural (e.g., ten) maximum values from the similarity distribution to acquire mean MaxPO and mean MaxPl . Moreover, it is needless to say that the processing order of the steps S805a and S805b can be inverted.
  • step S806 it is judged whether or not the character input in the step S803 is the last character. If it is judged that the input character is the last character (YES in step S806) , the watermark message is output (step S807), and the process ends. Meanwhile, if it is judged that the input character is not the last character (NO in step S806) , the flow returns to the step S803 to continue the process. Modification 1>
  • Fig. 12 is a diagram for explaining the changes of the character before and after the embedding of the watermark message, according to the modification 1.
  • Fig. 13 is a flow chart showing the process of the step S306 in the modification 1.
  • step S306e the bit to be embedded is selected from the watermark message 104.
  • step S306f the character to which the watermark message is to be embedded is selected, and the feature point of the selected character is extracted.
  • the processing procedure in the step S306f will further be explained in detail with reference to Fig. 14.
  • Fig. 14 is the flow chart showing the process of extracting the intersection of the character.
  • a step S306fl it is judged whether or not the input character image is a binary image. If it is judged that the input character image is not a binary image (NO in step S306fl), the flow advances to a step S306f2 to execute a binarization process to the input character.
  • the binarization process in a case where the input image is a multivalued image, the pixel which is smaller than a certain shading value is set to a black pixel, and the pixel which is larger than the certain shading value is set to a white pixel.
  • the binarization process is the preprocess of a character thinning process.
  • the flow advances to a step S306f3.
  • the binarized character image is subjected to the character thinning process.
  • the character thinning process is the process of extracting the center line of with the line width is "1" from the binarized image.
  • the character thinning process is executed by using the Hildith's thinning method, which is one of the basic character thinning methods.
  • the Hildith' s thinning method is described in detail in "Introduction to Image Processing Using Programming Language C"; Takeshi AGUI, Tomoharu NAGAO; Shokodo; November 2000; ISBN: 4785631244.
  • a Japanese character 1601 (kanji character representing "eye") before the embedding of the watermark message as shown in Fig. 15 is subjected to the character thinning process by using the Hildith' s thinning method, a thinned character 1602 is acquired.
  • step S306f4 the intersection which is the feature point is extracted from the thinned character image. More specifically, in the step S306f4, the eight pixels which surround the target point where the character image exists are first checked. Then, if the values of the checked eight pixels are the same as those of the operator expression shown in Fig. 16, the relevant target point is judged as the intersection.
  • step S306f5 it is judged whether or not the feature point is extracted. If it is judged that the feature point is not extracted (NO in step S306f5), the flow advances to a step S306f6 to set the whole character as one feature point.
  • step S306f if the feature point is extracted in the step S306f, the flow advances to a step S306g to judge whether or not the bit of the watermark message to be embedded is "1", that is, whether or not the bit selected in the step S306e is "1".
  • step S306g If it is judged in the step S306g that the bit of the watermark message to be embedded is "1" (YES in step S306g) , the flow advances to a step S306h to constitute by the pattern "1" all the feature points of the character extracted in the step S306f. For example, if all the feature points of the character 1601 before the embedding shown in Fig. 15 are constituted by using the pattern "1", a character 1603 after the embedding is acquired.
  • step S306g determines whether the bit of the watermark message to be embedded is "0" (NO in step S306g) . If it is judged in the step S306g that the bit of the watermark message to be embedded is "0" (NO in step S306g) , the flow advances to a step S306o to constitute by the pattern "0" the feature point of the character extracted in the step S306f.
  • the present invention is further modified so as to embed, by using three patterns, the different patterns, i.e., the pattern "1" and the pattern "0", in the character in which any watermark message is not to be embedded, thereby preventing that the character in which the watermark message has not been embedded is erroneously recognized on the extraction side as the character in which the watermark message has been embedded.
  • Fig. 18 is a diagram for explaining the changes of the character before and after the embedding of the watermark message, according to the modification 2.
  • the procedure of embedding the watermark message by using the pattern "0" and the pattern "1" is the same as that in the first embodiment.
  • the flow advances to the step S310 in Fig. 17 to constitute the character by using a pattern "2".
  • the character in which the watermark message cannot be embedded is, for example, a too small character, code or the like.
  • the pattern "2" is different from the pattern "1” and the pattern "0". More specifically, as the pattern "2", it is desirable to use the pattern which is not erroneously recognized as the pattern "1" or the pattern "0".
  • step S804 it is judged in the step S804 whether or not the area of the circumscribed rectangle of the input character is the area of the character in which the watermark message has been embedded. Then, if it is judged that the area of the circumscribed rectangle of the input character is the area of the character in which the watermark message has been embedded (YES in step S804), the flow advances to the step S805 to extract the watermark message .
  • step S804 if it is judged that the area of the circumscribed rectangle of the input character is not the area of the character in which the watermark message has been embedded (NO in step S804), the flow advances to the step S808 to judge whether or not the pattern "2" has been embedded in the character. If it is judged that the pattern "2" has been embedded in the character (YES in step S308), the flow returns to the step S803 to input next one character. Meanwhile, if it is judged that the pattern "2" is not embedded in the character (NO in step S308), the flow advances to the step S805 to extract the watermark message.
  • the different pattern has been embedded in the character in which the watermark message is not embedded. Then, even in case of executing the watermark message extraction process, the extraction of the watermark message is not executed in regard to the character constituted by the pattern "2", whereby it is possible to prevent that the watermark message is erroneously detected. Moreover, the character in which the watermark message is not embedded is constituted by using the predetermined pattern, whereby it is possible to obscure the density difference between the character in which the watermark message is not embedded and the character in which the watermark message has been embedded. (Second Embodiment)
  • Fig. 20 is a diagram for explaining the size change of the pattern for extracting the watermark message in the second embodiment.
  • Fig. 21 is a flow chart for explaining the step S805 in the second embodiment. Initially, in a step S805f, the sizes of the pattern "0" and the pattern “1" are changed respectively to set a pattern "0k” and a pattern “Ik”. Subsequently, the step S805f will be explained in detail with reference to a flow chart shown in Fig. 22.
  • Fig. 22 is the flow chart for explaining the method of enlarging the pattern in the second embodiment.
  • the resolution is acquired from a watermarked image file optically read by a scanner etc. Then, the acquired resolution is divided by the resolution at the time when the former watermarked image is printed, and the acquired value is set as a multiple number k of the character (step S805fl).
  • the resolution at the time when the watermarked image is printed is necessary at the time when the watermark message is extracted, and the resolution may therefore be stored in the memory unit in advance or memorized secretly by the user as the key for the watermark message extraction process. For example, in a case where the former watermark message document printed at the resolution 300dpi is optically read by the scanner or the like at the resolution 600dpi, the multiple number k is "2".
  • step S805f2 it is judged whether or not the multiple number k is a positive integer (step S805f2) . If it is judged that the multiple number k is the positive integer (YES in step S805f2), the pattern "0" is multiplied (enlarged) by "k” in the nearest neighbor method to acquire the pattern "Ok” (step S805f3) , and the pattern "1" is then multiplied (enlarged) by "k” in the nearest neighbor method to acquire the pattern "Ik” (step S805f4).
  • step S805f2 if it is judged that the multiple number k is not the positive integer (NO in step S805f2), the pattern "0" is multiplied (enlarged) by "k” in the bilinear interpolation method to acquire the pattern "0k” (step S805f5) , and the pattern "1” is then multiplied (enlarged) by "k” in the bilinear interpolation method to acquire the pattern "Ik” (step S805f6) .
  • Fig. 23 it is assumed that the respective values at the four points (x, y) , (x, y + 1), (x + 1, y) and (x + 1, y + 1) are the already known values. In the circumstances, the value at the point (xl, yl) is acquired. At that time, the value at the nearest point from among the four points is set as the value at the point (xl, yl) . That is, in Fig. 23, the value at the point (x + 1, y + 1) is the value at the point (xl, yl) .
  • Fig. 24 it is assumed that Z O o indicates the already known value at the point (0, 0), Zoi indicates the already known value at the point (0, 1), Z i0 indicates the already known value at the point (1, 0), and Zu indicates the already known value at the point (1, 1). In the circumstances, the value Z at the point (x, y) is acquired.
  • the value Z 0 at the point (x, 0) is acquired by using the values Zoo and Zi 0 according to the following equation.
  • the value Z 1 at the point (x, 1) is acquired by using the values Z O i and Zn according to the following equation.
  • the correction amounts at the relevant point in the x and y axes are acquired by respectively executing the bilinear interpolation to the x and y axes .
  • step S805g shown in Fig. 21 the cross correlation between the character from which the watermark is to be extracted and the pattern "0k” is acquired, and the maximum value MaxPO is acquired from the similarity (the set of matches) acquired through the cross correlation.
  • step S805h shown in Fig. 21 the cross correlation between the character and the pattern "Ik” is acquired, and the maximum value MaxPl is acquired from the similarity (the set of matches) acquired through the cross correlation.
  • step S805i it is judged whether or not the maximum value MaxPl is larger than the maximum value MaxPO. Then, if it is judged that the maximum value MaxPl is larger than the maximum value MaxPO (YES in step S805i), "1" is extracted as the watermark message (step S805J) . Meanwhile, if it is judged that the maximum value MaxPl is smaller than the maximum value MaxPO (NO in step S805i), "0" is extracted as the watermark, message (step S805k) . Therefore, even if the size of the character optically read by the scanner or the like changes, it is possible to correctly extract the watermark message .
  • the modification 1 of the second embodiment will be explained hereinafter. That is, the present invention is further modified so as to be able to extract the watermark message even in a case where it is impossible to know how much the document image optically read by the scanner or the like is enlarged or reduced (namely, multiplied) as compared with the document image at the time when the watermark message is embedded.
  • the magnification of enlarging (or reducing) the character can be acquired from the scan information or the like.
  • the modification 1 of the second embodiment it is assumed that the magnification of enlarging (or reducing) the character cannot be acquired from the existing information.
  • Fig. 25 is a flow chart for explaining the step S805fl in the modification 1 of the second embodiment.
  • step S805fla one character which is judged that the watermark message has been embedded therein is input. Then, in a step S805flb, "1" is given to a parameter I.
  • a step S805flc the size of the pattern "0" is multiplied by I * 0.5 to acquire the maximum similarity to the character.
  • the maximum similarity acquired in case of the parameter I is P[I] .
  • step S805fld the size of the pattern "1" is multiplied by I * 0.5 to calculate the maximum similarity to the character. Then, the calculated maximum similarity is given to P[I + 10] .
  • the parameter I * 0.5 is set in the step S805flc and the step S805fld so as to enlarge the pattern in units of 0.5 magnification.
  • "0.5" may further be reduced to acquire the magnification more finely.
  • the range of the parameter I is designated from “1" to "10” in the modification 1 of the second embodiment.
  • the present invention is not limited to this.
  • magnifications are sequentially changed to "same size" to infer the magnifications of enlarging and reducing the size.
  • sizes of the original before and after the size change can be inferred to some extent. For example, an A4 size is often enlarged to a B4 size and an A3 size. In such a case, if the magnifications of enlarging and reducing the size acquired from the inferred sizes are applied, it is possible to further effectively infer the magnifications of enlarging and reducing the size.
  • the present invention is further modified so as to be able to, even in a case where the angle of the document is inclined when the watermarked document image is optically read by the scanner or the like, correctly extract the watermark message by adjusting the angle of the document.
  • the constitution and the processing procedure necessary in the operation of the third embodiment are the same as those necessary in the operation of the first embodiment except for the process in the step S302 in the first embodiment. Therefore, in the following, only the point different from the first embodiment will be explained in detail.
  • the angle of the input document image is first adjusted in the step S302.
  • Fig. 26 is a flow chart for explaining the angle adjustment of the document image.
  • an inclination amount R of the document image is acquired to make the row of the input document horizontal or vertical.
  • a solid-line rectangle 3101 is the rectangle which represents the range of the input image
  • a dotted-line rectangle 3102 is the rectangle which represents the inclination of the original.
  • the input image includes a document portion 3103 in a range 3105 and noises 3104, and the portion which is necessary in the input image is the document image.
  • Numeral 3106 denotes an angle which is equivalent to the inclination amount R to be acquired, and the angle 3106 is the angle between the solid- line rectangle 3101 and the dotted-line rectangle 3102.
  • the direction of a document is first detected automatically, the projections of the document in its row direction are acquired respectively through the two search windows arranged in the relevant row direction, one of the acquired projections is shifted toward the direction perpendicular to the relevant row direction, and the inclination amount of the document image is acquired from the shift amount and the distance from the window when the correlation between the projections comes to be maximum.
  • a direction S of the character in the document image is acquired .
  • step S302bl one character is extracted from the document portion 3103.
  • step S302b2 the extracted character is rotated by R degrees to execute inclination adjustment .
  • step S302b3 the character is rotated in the four directions (0°, 90°, 180°, 270°) to execute character recognition.
  • the circumscribed rectangle i.e., character region
  • the circumscribed rectangle is also called a character- circumscribed rectangle.
  • the modification 1 of the third embodiment will be explained hereinafter. That is, the present invention is further modified so as to be able to, even in a case where the angle of the document is inclined when the watermarked document image is optically read by the scanner or the like, correctly extract the watermark message by rotating the pattern used in the extraction.
  • the angle of the input document image is first detected, and the pattern to be used for the watermark message extraction is rotated as well as the acquired angle.
  • Fig. 30 is a flow chart for explaining the rotation of the pattern.
  • the step S302a the inclination amount R of the document image is acquired to make the row of the input document horizontal or vertical.
  • the step S302b the direction S of the character in the document image is acquired.
  • the angle of the pattern "1" is deformed in a step S302e. More specifically, it only has to rotate the input image only by (R + S) degrees around the barycenter of the pattern "1". As a result, as shown in Fig.
  • the document image of which the angle has been corrected can be acquired from the input image shown in Fig. 27.
  • the input image is rotated by (R + S) degrees around the center of the pattern "0".
  • the maximum similarity to the character is acquired by using the pattern "1" and the pattern "0", and then the watermark message is extracted.
  • the modification 1 in the modification 1,- the pattern "1" and the pattern "0" which have been rotated by (R + S) degrees are used.
  • a step S302g the circumscribed rectangle (i.e., character region) is extracted from the input document image by the document analysis unit 102.
  • the present invention is further modified so as to be able to, in case of acquiring the inclination amount of the document image, know the inclination amount of the document image by executing pattern matching as rotating the patterns.
  • Fig. 31 is a flow chart for explaining the step S302a in the modification 2 of the third embodiment.
  • step S302al one character which is judged that the watermark message has been embedded therein is input.
  • step S302a4 the pattern "1" is rotated by I degrees to calculate the maximum similarity to the character. Then, the calculated maximum similarity is given to P[I/5 + 19].
  • a step S302a5 it is judged whether or not the parameter I is smaller than "90".
  • the parameter I + 5 is set in the step S302a3 and the step S302a4 so as to rotate the pattern in units of "5" degrees.
  • "5" may further be reduced to divide the image more finely.
  • the maximum similarity is once calculated in units of "5" degrees, it is then possible to again acquire the maximum similarity by reducing the unit of rotation in the angle region having the higher maximum similarity.
  • the object of the present invention can be achieved even in a case where the recording medium (or the storage medium) recording therein the program codes of software to realize the functions of the above embodiments is supplied to a system or an apparatus, and thus the computer (or the CPU, or the MPU) provided in the system or the apparatus reads and executes the program codes recorded in the recording medium.
  • the program codes themselves read from the recording realize the functions of the above embodiments. Therefore, the recording medium storing the relevant program codes constitutes the present invention.
  • the present invention includes not only the case where the functions of the above embodiments are realized by executing the read-out program codes by the computer, but also a case where the OS (operating system) or the like running on the computer executes a part or all of the actual processes based on the instructions of the program codes and thus the functions of the above embodiments are realized by the relevant processes .
  • the present invention also includes a case where, after the program codes read out of the recording medium were written into the memory provided in the function expansion card inserted in the computer or the function expansion unit connected to the computer, the CPU or the like provided in the function expansion card or the function expansion unit executes a part or all of the actual processes based on the instructions of the program codes, and thus the functions of the above embodiments are realized by the relevant processes.
  • the patterns to be used in the present invention are not limited to those explained in the above embodiments. That is, it is needless to say that the size (nine pixels in the above embodiments) of the pattern, the ratio of black and white pixels in the pattern, and the locations of the black and white pixels in the pattern are not limited to those explained in the above embodiments. Further, the ratio of the black and white pixels can arbitrarily be set in the pattern if the relevant pattern can be distinguished from other patterns. Incidentally, the two patterns are used in the above embodiments. However, the present invention is not limited to this. For example, if four patterns are used, it is possible to further embed a larger number of message data.
  • the character In case of embedding the watermark message bit "0", the character may be constituted by the pattern "1". On the other hand, in case of embedding the watermark message bit "1", the character may be constituted by the pattern "0". That is, if the watermark embedding side and the watermark extraction side share the same pattern, it only has to grasp for these sides which pattern corresponds to which message bit.
  • the watermark message is embedded in the digital data, the relevant digital data is once printed, and then the digital data is again acquired by scanning the acquired printed material on which the relevant digital data has been printed. Even in this case, according to the above embodiments of the present invention, it is possible to maintain the state that the watermark message cannot easily be lost even after the digital data was printed.
  • the watermark message is embedded in the digital data, the relevant digital data is once printed, and then the acquired printed material on which the relevant digital data has been printed is copied by the copying machine. Even in this case, according to the above embodiments of the present invention, the watermark message goes away, whereby it is possible to assure the originality of the digital data.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
PCT/JP2006/307888 2005-04-12 2006-04-07 Image processing device, image processing method, program for executing image processing method, and storage medium for storing program Ceased WO2006109866A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/815,893 US20090021793A1 (en) 2005-04-12 2006-04-07 Image processing device, image processing method, program for executing image processing method, and storage medium for storing program
CN2006800119974A CN101160950B (zh) 2005-04-12 2006-04-07 图像处理装置和图像处理方法

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2005114532A JP4310288B2 (ja) 2005-04-12 2005-04-12 画像処理装置及びその方法、プログラム並びに記憶媒体
JP2005-114532 2005-04-12

Publications (1)

Publication Number Publication Date
WO2006109866A1 true WO2006109866A1 (en) 2006-10-19

Family

ID=37087128

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2006/307888 Ceased WO2006109866A1 (en) 2005-04-12 2006-04-07 Image processing device, image processing method, program for executing image processing method, and storage medium for storing program

Country Status (4)

Country Link
US (1) US20090021793A1 (enExample)
JP (1) JP4310288B2 (enExample)
CN (1) CN101160950B (enExample)
WO (1) WO2006109866A1 (enExample)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9778253B2 (en) 2009-04-20 2017-10-03 Universal Bio Research Co., Ltd. Tube for measuring bio-related substance and quantifying system
CN114275416A (zh) * 2022-01-19 2022-04-05 平安国际智慧城市科技股份有限公司 基于图像识别的厨余垃圾分类方法、装置、设备及介质

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4289327B2 (ja) * 2005-06-27 2009-07-01 ブラザー工業株式会社 印刷制御用プログラム及び印刷システム
JP4689570B2 (ja) * 2006-10-11 2011-05-25 キヤノン株式会社 画像処理装置、画像処理方法
JP4818091B2 (ja) * 2006-12-13 2011-11-16 キヤノン株式会社 情報処理装置、画像処理装置、情報処理装置の制御方法及び画像処理装置の制御方法
US8224019B2 (en) * 2007-05-22 2012-07-17 Xerox Corporation Embedding information in document blank space
JP4871793B2 (ja) * 2007-06-15 2012-02-08 キヤノン株式会社 情報処理装置及びその方法
JP4837101B2 (ja) 2007-08-31 2011-12-14 富士通株式会社 電子透かし埋め込み装置、電子透かし検出装置およびプログラム
JP4956363B2 (ja) * 2007-10-10 2012-06-20 キヤノン株式会社 情報処理装置及びその制御方法
JP5155695B2 (ja) * 2008-02-29 2013-03-06 トッパン・フォームズ株式会社 カラーコード
JP4587058B2 (ja) * 2008-09-10 2010-11-24 富士ゼロックス株式会社 画像処理装置、画像処理システム及びプログラム
KR101038108B1 (ko) * 2009-05-22 2011-06-08 주식회사 파일태그 위변조 검증용 이미지파일 생성방법 및 이미지파일의 위변조 검증방법
US8144925B2 (en) 2010-08-24 2012-03-27 Seiko Epson Corporation Mapping based message encoding for fast reliable visible watermarking
JP5472471B2 (ja) * 2010-08-27 2014-04-16 富士通株式会社 電子透かし埋め込み装置、電子透かし埋め込み方法及び電子透かし埋め込み用コンピュータプログラムならびに電子透かし検出装置
CN102169534A (zh) * 2011-02-21 2011-08-31 北京书生国际信息技术有限公司 一种显示水印的方法和装置
WO2018006095A2 (en) * 2016-07-01 2018-01-04 Digimarc Corporation Image-based pose determination
KR102646952B1 (ko) * 2019-01-04 2024-03-14 주식회사 마크애니 비디오 콘텐츠에 대한 위변조를 방지하기 위한 부가데이터를 검출하여 디스플레이하는 장치, 방법 및 시스템, 상기 디스플레이 장치와 연동하는 재생장치, 상기 장치의 재생방법
ES2972232T3 (es) * 2021-06-03 2024-06-11 Telefonica Cibersecurity & Cloud Tech S L U Método de visión por ordenador para detectar regiones de documentos que serán excluidas de un proceso de incrustación y programas informáticos del mismo

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0620122A (ja) * 1992-06-30 1994-01-28 Minolta Camera Co Ltd 管理装置
JPH07184069A (ja) * 1993-12-22 1995-07-21 Ricoh Co Ltd 機密文書管理装置
JP2002111994A (ja) * 2000-09-12 2002-04-12 Internatl Business Mach Corp <Ibm> 拡大縮小耐性を有する電子透かし方法およびシステム

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6738491B1 (en) * 1992-06-30 2004-05-18 Minolta Co., Ltd. Image forming apparatus and copy management system
US5671277A (en) * 1992-06-30 1997-09-23 Minolta Camera Kabushiki Kaisha Image forming apparatus and copy management system
US6086706A (en) * 1993-12-20 2000-07-11 Lucent Technologies Inc. Document copying deterrent method
JP4114959B2 (ja) * 1995-06-20 2008-07-09 キヤノン株式会社 画像処理方法及び装置
US6252971B1 (en) * 1998-04-29 2001-06-26 Xerox Corporation Digital watermarking using phase-shifted stoclustic screens
US7174030B2 (en) * 2001-02-06 2007-02-06 Victor Company Of Japan, Ltd. Method and apparatus for embedding and reproducing watermark into and from contents data
JP4317667B2 (ja) * 2001-03-07 2009-08-19 パイオニア株式会社 複製管理方法、複製管理装置及びプログラム
JP3746230B2 (ja) * 2001-09-29 2006-02-15 株式会社東芝 レコーディング装置、コピー制御方法及びプログラム
JP4164463B2 (ja) * 2003-06-03 2008-10-15 キヤノン株式会社 情報処理装置及びその制御方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0620122A (ja) * 1992-06-30 1994-01-28 Minolta Camera Co Ltd 管理装置
JPH07184069A (ja) * 1993-12-22 1995-07-21 Ricoh Co Ltd 機密文書管理装置
JP2002111994A (ja) * 2000-09-12 2002-04-12 Internatl Business Mach Corp <Ibm> 拡大縮小耐性を有する電子透かし方法およびシステム

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9778253B2 (en) 2009-04-20 2017-10-03 Universal Bio Research Co., Ltd. Tube for measuring bio-related substance and quantifying system
CN114275416A (zh) * 2022-01-19 2022-04-05 平安国际智慧城市科技股份有限公司 基于图像识别的厨余垃圾分类方法、装置、设备及介质

Also Published As

Publication number Publication date
JP2006295606A (ja) 2006-10-26
JP4310288B2 (ja) 2009-08-05
CN101160950A (zh) 2008-04-09
CN101160950B (zh) 2011-08-24
US20090021793A1 (en) 2009-01-22

Similar Documents

Publication Publication Date Title
US7106884B2 (en) Digital watermark embedding apparatus for document, digital watermark extraction apparatus for document, and their control method
US20090021793A1 (en) Image processing device, image processing method, program for executing image processing method, and storage medium for storing program
US8427509B2 (en) Method for embedding messages into documents using distance fields
JP4343968B2 (ja) 画像形成装置及び方法
US7411702B2 (en) Method, apparatus, and computer program product for embedding digital watermark, and method, apparatus, and computer program product for extracting digital watermark
JP4164463B2 (ja) 情報処理装置及びその制御方法
JP4819723B2 (ja) 情報抽出装置、情報抽出方法、情報抽出プログラム及び記録媒体
US8064636B2 (en) Image processing apparatus and method of controlling the same
JP4380733B2 (ja) 原稿の複写履歴を管理する装置及びその方法
JP4871794B2 (ja) 印刷装置及び印刷方法
JP4552754B2 (ja) 情報埋込装置、方法、プログラムおよび記録媒体、ならびに情報検出装置、方法、プログラムおよびコンピュータ読取可能な記録媒体
US8059859B2 (en) Image processing apparatus and method of controlling the same
JP5436402B2 (ja) メッセージを構造化された形状内に埋め込む方法およびシステム
JP2006050551A (ja) 画像処理装置及びその方法、並びにプログラム及び記憶媒体
JP2009060230A (ja) 画像形成装置及び画像形成装置の制御方法並びにそのプログラム及び記憶媒体
US8126193B2 (en) Image forming apparatus and method of image forming
JP2005117154A (ja) 電子透かし埋め込み方法、電子透かし埋め込み装置、電子透かし抽出方法、電子透かし抽出装置、上記各方法を実行可能なコンピュータプログラム、及びこれを記憶した記憶媒体
JP4324058B2 (ja) 画像処理装置及びその方法
JP4164458B2 (ja) 情報処理装置及び方法、並びに、コンピュータプログラム及びコンピュータ可読記憶媒体
JP2001251490A (ja) 印刷制御装置、複写機、印刷制御方法、複写制御方法、印刷制御プログラムを記録した媒体及び複写制御プログラムを記録した媒体
JP4552757B2 (ja) 画像処理装置、画像処理方法、および画像処理プログラム
JP4861250B2 (ja) 画像処理装置およびその制御方法
JP2008301283A (ja) 画像処理装置およびその制御方法
JP2008301284A (ja) 画像処理装置およびその制御方法
JP2005253005A (ja) 情報処理装置及び方法、並びに、コンピュータプログラム及びコンピュータ可読記憶媒体

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200680011997.4

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 11815893

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: RU

122 Ep: pct application non-entry in european phase

Ref document number: 06731824

Country of ref document: EP

Kind code of ref document: A1