Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Hidden Barcode in Sub-Images with Invisible Locating Marker

Published: 15 October 2024 Publication History

Abstract

The prevalence of the Internet of Things has led to the widespread adoption of 2D barcodes as a means of offline-to-online communication. Whereas, 2D barcodes are not ideal for publicity materials due to their space-consuming nature. Recent works have proposed 2D image barcodes that contain invisible codes or hyperlinks to transmit hidden information from offline to online. However, these methods undermine the purpose of the codes being invisible due to the the requirement of markers to locate them. The conference version of this work presented a novel imperceptible information embedding framework for display or print-camera scenarios, which includes not only hiding and recovery but also locating and correcting. With the assistance of learned invisible markers, hidden codes can be rendered truly imperceptible. A highly effective multi-stage training scheme is proposed to achieve high visual fidelity and retrieval resiliency, wherein information is concealed in a sub-region rather than the entire image. However, our conference version does not address the optimal sub-region for hiding, which is crucial when dealing with local region concealment problems. In this article extension, we consider human perceptual characteristics and introduce an optimal hiding region recommendation algorithm that comprehensively incorporates Just Noticeable Difference and visual saliency factors into consideration. Extensive experiments demonstrate superior visual quality and robustness compared to state-of-the-art methods. With the assistance of our proposed hiding region recommendation algorithm, concealed information becomes even less visible than the results of our conference version without compromising robustness.

References

[1]
Herbert Bay, Tinne Tuytelaars, and Luc Van Gool. 2006. SURF: Speeded up Robust Features. In European Conference on Computer Vision. Springer, 404–417.
[2]
Changsheng Chen, Wenjian Huang, Baojian Zhou, Chenchen Liu, and Wai Ho Mow. 2016. PiCode: A New Picture-Embedding 2D Barcode. IEEE Transactions on Image Processing 25, 8 (2016), 3444–3458.
[3]
Changsheng Chen, Baojian Zhou, and Wai Ho Mow. 2018. RA Code: A Robust and Aesthetic Code for Resolution-Constrained Applications. IEEE Transactions on Circuits and Systems for Video Technology 28, 11 (2018), 3300–3312.
[4]
Hung-Kuo Chu, Chia-Sheng Chang, Ruen-Rone Lee, and Niloy J Mitra. 2013. Halftone QR Codes. ACM Transactions on Graphics (TOG) 32, 6 (2013), 1–8.
[5]
Xiao Chu, Wanli Ouyang, Hongsheng Li, and Xiaogang Wang. 2016. Structured Feature Learning for Pose Estimation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 4715–4723.
[6]
Xiao Chu, Wei Yang, Wanli Ouyang, Cheng Ma, Alan L. Yuille, and Xiaogang Wang. 2017. Multi-Context Attention for Human Pose Estimation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1831–1840.
[7]
Dajun Du, Changda Zhang, Xue Li, Minrui Fei, Taicheng Yang, and Huiyu Zhou. 2021. Secure Control of Networked Control Systems Using Dynamic Watermarking. IEEE Transactions on Cybernetics 52, 12 (2021), 13609–13622.
[8]
Mark Everingham, S. M. Ali Eslami, Luc Van Gool, Christopher K. I. Williams, John Winn, and Andrew Zisserman. 2015. The Pascal Visual Object Classes Challenge: A Retrospective. International Journal of Computer Vision 111, 1 (2015), 98–136.
[9]
Han Fang, Dongdong Chen, Qidong Huang, Jie Zhang, Zehua Ma, Weiming Zhang, and Nenghai Yu. 2020. Deep Template-Based Watermarking. IEEE Transactions on Circuits and Systems for Video Technology 31, 4 (2020), 1436–1451.
[10]
Han Fang, Dongdong Chen, Feng Wang, Zehua Ma, Honggu Liu, Wenbo Zhou, Weiming Zhang, and Neng-Hai Yu. 2021. TERA: Screen-to-Camera Image Code with Transparency, Efficiency, Robustness and Adaptability. IEEE Transactions on Multimedia 24 (2021), 955–967.
[11]
Han Fang, Weiming Zhang, Hang Zhou, Hao Cui, and Nenghai Yu. 2018. Screen-Shooting Resilient Watermarking. IEEE Transactions on Information Forensics and Security 14, 6 (2018), 1403–1418.
[12]
Jiayun Fu, Bin B. Zhu, Haidong Zhang, Yayi Zou, Song Ge, Weiwei Cui, Yun Wang, Dongmei Zhang, Xiaojing Ma, and Hai Jin. 2022. ChartStamp: Robust Chart Embedding for Real-World Applications. In Proceedings of the 30th ACM International Conference on Multimedia. 2786–2795.
[13]
Zhongpai Gao, Guangtao Zhai, and Chunjia Hu. 2015. The Invisible QR Code. In Proceedings of the 23rd ACM International Conference on Multimedia. 1047–1050.
[14]
Gonzalo J. Garateguy, Gonzalo R. Arce, Daniel L. Lau, and Ofelia P. Villarreal. 2014. QR Images: Optimized Image Embedding in QR Codes. IEEE Transactions on Image Processing 23, 7 (2014), 2842–2853.
[15]
Chris Harris and Mike Stephens. 1988. A Combined Corner and Edge Detector. In Proceedings of the 4th Alvey Vision Conference, Vol. 15. Citeseer, 147–151.
[16]
Laurent Itti, Christof Koch, and Ernst Niebur. 1998. A Model of Saliency-Based Visual Attention for Rapid Scene Analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence 20, 11 (1998), 1254–1259.
[17]
Jun Jia, Zhongpai Gao, Kang Chen, Menghan Hu, Xiongkuo Min, Guangtao Zhai, and Xiaokang Yang. 2020. RIHOOP: Robust Invisible Hyperlinks in Offline and Online Photographs. IEEE Transactions on Cybernetics 52, 7 (2020), 7094–7106.
[18]
Jun Jia, Zhongpai Gao, Dandan Zhu, Xiongkuo Min, Guangtao Zhai, and Xiaokang Yang. 2022. Learning Invisible Markers for Hidden Codes in Offline-to-Online Photography. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2273–2282.
[19]
Neil F. Johnson and Sushil Jajodia. 1998. Exploring Steganography: Seeing the Unseen. Computer 31, 2 (1998), 26–34.
[20]
I. G. Karybali and K. Berberidis. 2006. Efficient Spatial Image Watermarking via New Perceptual Masking and Blind Detection Schemes. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 256–274.
[21]
Jia Liu, Yan Ke, Yu Lei, Zhuo Zhang, Jun Li, Peng Luo, Minqing Zhang, and Xiaoyuan Yang. 2019. Recent advances of image steganography with generative adversarial networks. arXiv:1907.01886. Retrieved from https://arxiv.org/abs/1907.01886
[22]
David G. Lowe. 2004. Distinctive Image Features from Scale-Invariant Keypoints. International Journal of Computer Vision 60, 2 (2004), 91–110.
[23]
Xiyang Luo, Ruohan Zhan, Huiwen Chang, Feng Yang, and Peyman Milanfar. 2020. Distortion Agnostic Deep Watermarking. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 13548–13557.
[24]
Lisa M. Marvel, Charles G. Boncelet, and Charles T. Retter. 1999. Spread Spectrum Image Steganography. IEEE Transactions on Image Processing 8, 8 (1999), 1075–1083.
[25]
Xiongkuo Min, Ke Gu, Guangtao Zhai, Xiaokang Yang, Wenjun Zhang, Patrick Le Callet, and Changwen Chen. 2021. Screen Content Quality Assessment: Overview, Benchmark, and Beyond. ACM Computing Surveys (CSUR) 54, 9 (2021), 1–36.
[26]
D. P. Mukherjee, S. Maitra, and S. T. Acton. 2004. Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication. IEEE Transactions on Multimedia 6, 1 (2004), 1–15.
[27]
Olaf Ronneberger, Philipp Fischer, and Thomas Brox. 2015. U-Net: Convolutional Networks for Biomedical Image Segmentation. In Proceedings of the International Conference on Medical Image Computing and Computer-Assisted Intervention (MICCAI ’15). 234–241.
[28]
Ethan Rublee, Vincent Rabaud, Kurt Konolige, and Gary Bradski. 2011. ORB: An Efficient Alternative to SIFT or SURF. In Proceedings of the International Conference on Computer Vision. 2564–2571.
[29]
Richard Shin and Dawn Song. 2017. JPEG-Resistant Adversarial Images. In Proceedings of the NeurIPS Workshop on Machine Learning and Computer Security.
[30]
Ke Sun, Bin Xiao, Dong Liu, and Jingdong Wang. 2019. Deep High-Resolution Representation Learning for Human Pose Estimation. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 5693–5703.
[31]
Matthew Tancik, Ben Mildenhall, and Ren Ng. 2019. StegaStamp: Invisible hyperlinks in physical photographs. arXiv:1904.05343. Retrieved from https://arxiv.org/abs/1904.05343
[32]
Huawei Tian, Yao Zhao, Rongrong Ni, Lunming Qin, and Xuelong Li. 2013. LDFT-Based Watermarking Resilient to Local Desynchronization Attacks. IEEE Transactions on Cybernetics 43, 6 (2013), 2190–2201.
[33]
Alexander Toshev and Christian Szegedy. 2014. Deeppose: Human Pose Estimation via Deep Neural Networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1653–1660.
[34]
Denis Volkhonskiy, Ivan Nazarov, and Evgeny Burnaev. 2017. Steganographic generative adversarial networks. arXiv:1703.05502. Retrieved from https://arxiv.org/abs/1703.05502
[35]
Jingdong Wang, Ke Sun, Tianheng Cheng, Borui Jiang, Chaorui Deng, Yang Zhao, Dong Liu, Yadong Mu, Mingkui Tan, and Xinggang Wang. 2020. Deep High-Resolution Representation Learning for Visual Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 43, 10 (2020), 3349–3364.
[36]
Zhou Wang, Alan Conrad Bovik, Hamid Rahim Sheikh, and Eero P. Simoncelli. 2004. Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Transactions on Image Processing 13, 4 (April 2004), 600–612. DOI:
[37]
Eric Wengrowski and Kristin Dana. 2019. Light Field Messaging with Deep Photographic Steganography. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 1515–1524.
[38]
Jinjian Wu, Leida Li, Weisheng Dong, Guangming Shi, Weisi Lin, and C.-C. Jay Kuo. 2017. Enhanced Just Noticeable Difference Model for Images with Pattern Complexity. IEEE Transactions on Image Processing 26, 6 (2017), 2682–2693.
[39]
Guangtao Zhai and Xiongkuo Min. 2020. Perceptual Image Quality Assessment: A Survey. Science China Information Sciences 63, 11 (2020), Article 211301.
[40]
Kevin Alex Zhang, Alfredo Cuesta-Infante, Lei Xu, and Kalyan Veeramachaneni. 2019. SteganoGAN: High capacity image steganography with GANs. arXiv:1901.03892. Retrieved from https://arxiv.org/abs/1901.03892
[41]
Peiying Zhang, Chenhui Li, and Changbo Wang. 2020. Viscode: Embedding Information in Visualization Images Using Encoder-Decoder Network. IEEE Transactions on Visualization and Computer Graphics 27, 2 (2020), 326–336.
[42]
Richard Zhang, Phillip Isola, Alexei A. Efros, Eli Shechtman, and Oliver Wang. 2018. The Unreasonable Effectiveness of Deep Features as a Perceptual Metric. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). DOI:
[43]
Jiren Zhu, Russell Kaplan, Justin Johnson, and Fei-Fei Li. 2018. HiDDeN: Hiding Data with Deep Networks. In Proceedings of the European Conference on Computer Vision (ECCV).
[44]
Jianke Zhu, Chenxia Wu, Chun Chen, and Deng Cai. 2015. Treelets Binary Feature Retrieval for Fast Keypoint Recognition. IEEE Transactions on Cybernetics 45, 10 (2015), 2129–2141.

Cited By

View all
  • (2024)GSyncCode: Geometry Synchronous Hidden Code for One-step Photography DecodingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370606021:2(1-21)Online publication date: 26-Dec-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 20, Issue 10
October 2024
729 pages
EISSN:1551-6865
DOI:10.1145/3613707
  • Editor:
  • Abdulmotaleb El Saddik
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 October 2024
Online AM: 28 June 2024
Accepted: 13 June 2024
Revised: 26 May 2024
Received: 12 June 2023
Published in TOMM Volume 20, Issue 10

Check for updates

Author Tags

  1. Invisible information hiding
  2. display/print-to-camera communications
  3. keypoint detection

Qualifiers

  • Research-article

Funding Sources

  • National Natural Science Foundation of China
  • Shanghai Pujiang Program
  • China Postdoctoral Science Foundation
  • Postdoctoral Fellowship Program of CPSF

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)321
  • Downloads (Last 6 weeks)50
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)GSyncCode: Geometry Synchronous Hidden Code for One-step Photography DecodingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370606021:2(1-21)Online publication date: 26-Dec-2024

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media