Digital Media Forensics and Security

Research Progress on Glyph Perturbation for Anti-print Scanning and Anti-screen Shooting

Expand
  • 1. School of Electronics and Communication Engineering, Zhejiang Post and Telecommunication College, Shaoxing 312366, Zhejiang, China;
    2. School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, Zhejiang, China;
    3. School of Computer and Software, Hangzhou Dianzi University, Hangzhou 310018, Zhejiang, China

Received date: 2022-10-27

  Online published: 2023-03-29

Abstract

In this paper, we provide a review on the research progress of glyph perturbation. Following an introduction of the application scenarios of glyph perturbation, the existing works related to glyph perturbation for anti-print scanning and anti-screen shooting are systematically presented. The existing methods can be classified into two categories: traditional glyph perturbation and deep learning-based glyph perturbation. According to the attributes of characters, the former can be subdivided into pixel flipping, height adjustment, spacing adjustment, stroke adjustment, feature point adjustment, and skeleton adjustment. From the perspective of high-dimensional features, the latter slightly modifies the glyph of characters to embed additional messages. According to the property of the generated data, it can be divided into perturbed text image generation and vector font generation. The glyph perturbation methods are compared and analyzed in terms of robustness, embedding capacity, and complexity. Finally, the challenges and prospects of glyph perturbation are summarized.

Cite this article

WANG Chen, YAO Ye, LI Li . Research Progress on Glyph Perturbation for Anti-print Scanning and Anti-screen Shooting[J]. Journal of Applied Sciences, 2023 , 41(2) : 240 -251 . DOI: 10.3969/j.issn.0255-8297.2023.02.005

References

[1] 毛一鸣. 抗打印扫描攻击的数字水印算法研究[D]. 哈尔滨:哈尔滨工业大学, 2021.
[2] 方涵. 屏摄鲁棒水印方法研究[D]. 合肥:中国科学技术大学, 2021.
[3] Wu M, Liu B D. Data hiding in binary image for authentication and annotation[J]. IEEE Transactions on Multimedia, 2004, 6(4):528-538.
[4] 张驰. 二值文本图像数字水印技术研究[D]. 重庆:重庆大学, 2007.
[5] 赵星阳, 孙继银, 李琳琳. 基于字符阶梯边沿调整的文本水印算法[J]. 计算机应用, 2008, 28(12):3175-3178, 3182. Zhao X Y, Sun J Y, Li L L. Watermarking of text images using character step edge adjustment[J]. Journal of Computer Applications, 2008, 28(12):3175-3178, 3182. (in Chinese)
[6] 郭承青, 徐国爱, 钮心忻, 等. 抗打印扫描攻击的大容量文本水印[J]. 应用科学学报, 2011, 29(2):140-146. Guo C Q, Xu G A, Niu X X, et al. High-capacity text watermarking resistive to print-scan process[J]. Journal of Applied Sciences, 2011, 29(2):140-146. (in Chinese)
[7] 亓文法, 李晓龙, 杨斌, 等. 用于信息追踪的文本水印算法[J]. 通信学报, 2008, 29(10):183-190. Qi W F, Li X L, Yang B, et al. Document watermarking scheme for information tracking[J]. Journal on Communications, 2008, 29(10):183-190. (in Chinese)
[8] 李晓妮. 一种文本文档中的信息隐藏方法和装置:CN107248134B[P]. 2021-05-11.
[9] 李晓妮. 一种纸质文档安全管控与溯源追踪的方法和装置:CN107066844B[P]. 2020-08-14.
[10] 雷敏, 杨榆, 胡若翔. 基于文字复杂度的抗打印扫描文本水印算法[J]. 北京邮电大学学报, 2015, 38(S1):58-62. Lei M, Yang Y, Hu R X. A print resilient watermark scheme based on character complexity[J]. Journal of Beijing University of Posts and Telecommunications, 2015, 38(S1):58-62. (in Chinese)
[11] Sun X M, Wang S F, Xia Z H, et al. Skeleton-based Chinese text image watermark algorithm robust to printing and scanning[J]. Information Technology Journal, 2013, 12(11):2130-2137.
[12] Brassil J T, Low S, Maxemchuk N F, et al. Electronic marking and identification techniques to discourage document copying[J]. IEEE Journal on Selected Areas in Communications, 1995, 13(8):1495-1504.
[13] Brassil J T, Low S, Maxemchuk N F. Copyright protection for the electronic distribution of text documents[C]//Proceedings of the IEEE, 1999, 87(7):1181-1196.
[14] 赵卫娟, 关虎, 黄樱, 等. 文本水印技术研究综述[J]. 中国传媒大学学报(自然科学版), 2020, 27(6):55-62. Zhao W J, Guan H, Huang Y, et al. A survey of text watermarking[J]. Journal of Communication University of China (Science and Technology), 2020, 27(6):55-62. (in Chinese)
[15] 黄华, 齐春, 李俊, 等. 一种新的文本数字水印标记策略和检测方法[J]. 西安交通大学学报, 2002, 36(2):165-168, 181. Huang H, Qi C, Li J, et al. New watermarking scheme and centroid detecting method for text documents[J]. Journal of Xi'an Jiaotong University, 2002, 36(2):165-168, 181. (in Chinese)
[16] 赵东宁, 张勇, 李德毅. 基于云模型的文本数字水印技术[J]. 计算机应用, 2003, 23(S2):100-102. Zhao D N, Zhang Y, Li D Y. Text watermarking based on cloudy mode[J]. Computer Applications, 2003, 23(S2):100-102. (in Chinese)
[17] 杨洁, 张敏瑞. 基于行移和字移编码的二值文本数字水印技术[J]. 西安邮电学院学报, 2006, 11(3):101-105. Yang J, Zhang M R. Document marking technique based on both line and word shifting[J]. Journal of Xi'an University of Post and Telecommunications, 2006, 11(3):101-105. (in Chinese)
[18] 惠路华. 基于Word文档的数字水印算法研究与实现[D]. 南京:南京理工大学, 2008.
[19] 张珍珍, 许盛伟, 崔敏龙. 基于数字水印的纸质文档保护研究[J]. 北京电子科技学院学报, 2015, 23(2):51-57. Zhang Z Z, Xu S W, Cui M L. The research of paper document tracking system solution based on watermarking technology[J]. Journal of Beijing Electronic Science and Technology Institute, 2015, 23(2):51-57. (in Chinese)
[20] Khosravi B, Khosravi B, Khosravi B, et al. A new method for pdf steganography in justified texts[J]. Journal of Information Security and Applications, 2019, 45:61-70.
[21] Qi W F, Guo W, Zhang T, et al. Robust authentication for paper-based text documents based on text watermarking technology[J]. Mathematical Biosciences and Engineering:MBE, 2019, 16(4):2233-2249.
[22] 亓文法, 刘宇鑫, 李晓龙, 等. 基于字符结构特征的文本水印嵌入和提取方法:CN102968582A[P]. 2016-03-30.
[23] 李晓妮. 一种敏感内容数据信息防护方法和系统:CN107239713A[P]. 2017-10-10.
[24] 李晓妮. 基于图像特征匹配的水印方法和装置:CN108711131B[P]. 2022-08-16.
[25] 杨榆, 陈雨薇, 雷敏, 等. 一种用于打印文档溯源的数字水印处理方法及装置:CN107644391B[P]. 2019-11-26.
[26] Tan L N, Sun X M, Sun G. Print-scan resilient text image watermarking based on stroke direction modulation for chinese document authentication[J]. Radio Engineering, 2012, 21(1):170-181.
[27] Tan L N, Hu K, Zhou X M, et al. Print-scan invariant text image watermarking for hardcopy document authentication[J]. Multimedia Tools and Applications, 2019, 78(10):13189-13211.
[28] 李晓妮. 一种水印字库的自动生成方法和装置:CN108763879A[P]. 2018-11-06.
[29] Xiao C, Zhang C, Zheng C X. FontCode:embedding information in text documents using glyph perturbation[J]. ACM Transactions on Graphics, 2018, 37(2):1-16.
[30] Cu V L, Burie J C, Ogier J M, et al. Hiding security feature into text content for securing documents using generated font[C]//2019 International Conference on Document Analysis and Recognition (ICDAR), 2019:1214-1219.
[31] Cu V L, Burie J C, Ogier J M, et al. A robust data hiding scheme using generated content for securing genuine documents[C]//2019 International Conference on Document Analysis and Recognition (ICDAR), 2019:787-792.
[32] 孙杉. 基于自动生成字库的中文鲁棒文档水印方法[D]. 合肥:中国科学技术大学, 2021.
[33] 孙杉, 张卫明, 方涵, 等. 中文水印字库的自动生成方法[J]. 中国图象图形学报, 2022, 27(1):262-276. Sun S, Zhang W M, Fang H, et al. Automatic generation of Chinese document watermarking fonts[J]. Journal of Image and Graphics, 2022, 27(1):262-276. (in Chinese)
[34] Wang C, Zhu Y N, Shen Z Y, et al. Font transfer based on parallel auto-encoder for glyph perturbation via strokes moving[C]//21st International Conference on Algorithms and Architectures for Parallel Processing. Virtual Event, 2022:586-602.
[35] Wang Y Z, Lian Z H. DeepVecFont:synthesizing high-quality vector fonts via dual-modality learning[J]. ACM Transactions on Graphics, 2021, 40(6):1-16.
[36] Gao Y C, Lian Z H, Tang Y M, et al. Automatic generation of Chinese vector fonts via deep layout inferring[C]//SIGGRAPH Asia 2019 Technical Briefs, 2019:33-36.
[37] Lian Z H, Gao Y C. CVFont:synthesizing Chinese vector fonts via deep layout inferring[J]. Computer Graphics Forum, 2022, 41(6):212-225.
[38] He K M, Zhang X Y, Ren S Q, et al. Deep residual learning for image recognition[C]//2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016:770-778.
[39] Ren S Q, He K M, Girshick R, et al. Faster R-CNN:towards real-time object detection with region proposal networks[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017, 39(6):1137-1149.
Outlines

/