Fig 2 - uploaded by Malay Kumar Kundu
Content may be subject to copyright.
The block diagram of Print-scan transformation.

The block diagram of Print-scan transformation.

Contexts in source publication

Context 1
... tuning mechanism is used to measure print-scan trans- formation using one which can correlate two images obtained before printing and that of obtained after scanning. The block diagram of overall transformation process is shown in Fig.2. Ì ½ and Ì ¾ are the transformation which occurred at the time of halftoning to printing and printing to scanning respectively. ...
Context 2
... tuning mechanism is used to measure print-scan transformation using one which can correlate two images obtained before printing and that of obtained after scanning. The block diagram of overall transformation process is shown in Fig.2. Ì ½ and Ì ¾ are the transformation which occurred at the time of halftoning to printing and printing to scanning respectively. ...

Similar publications

Article
Full-text available
The proposed work presents particulars of a technique for the design and hardware implementation of an information hiding scheme using hardware-software co-simulation. The methodology aims to improve the design verification efficiency, development time and cost for DSP solutions. The scheme represents architecture for visual information hiding fram...

Citations

... Rizzo et al. [18] suggest a method based on a password that embeds the watermark in short text and preserves the appearance and content without converting text to the image. A graphical digital text watermarking method and algorithmic framework is proposed in Liu et al. [19], which consists of 8 levels that are a line, pixel, character, paragraph, page pixel, row, etymon, and three other aspects. Each level is divided into three typical features like similarity, structural and self- [20] propose a technique that measures print-and-scan transformation which can correlate the image before printing and then embed the watermark information. ...
Article
Full-text available
Digital text is the most frequent interchange form of data that could hold sensitive information such as audit firms, banks, and educational institutes. This sensitive information needs to preserve its integrity and originality so that it could not only secure the data but also helps to identify ownership of text documents. This paper presents a novel and invisible digital watermarking approach for the secure exchange of text documents over the internet. Digital watermarking serves from the last decade for detection of forgery and tempering from digital text documents and maintained the copyright and authentication successfully. Many states of the art watermark techniques achieve high imperceptibility, robustness, and high hidden capacity; unfortunately failed to maintain the balance among these three conflicting parameters. As resolvent, we propose an intelligent Three-Level Digital Watermarking (3LDW) system for text documents copyright protection. 3LDW system can be applied to Microsoft Word objects, document open spaces, and text feature coding without affecting the content of the original document. Experimental results reveal that our proposed 3LDW system strongly resist against formatting attacks and efficiently preserves the imperceptibility. Additionally, embedding capacity analysis demonstrates a prominent improvement of the proposed system as compared to other similar approaches.