The counteraction to methods of a falsification paper, and recently and plastic, documents is a traditional and urgent task of protection of carriers of the information. One of key elements for many documents is the photo. It is possible to not speak what economic and legal harm the falsification of photos puts. Such documents as the passport, driver's certificate, credit or identification card, medical policy and others here concern.
Technology PhotoWaterMark represents a combination of the steganographic approach of concealment and the cryptographic approach of enciphering of data that provides practical impossibility of breaking. And, the basic inconvenience for breaking consists in analog representation of hidden data. The essence of the steganographic approach consists in concealment of the fact of transfer or introduction of the information in the carrier. One of such methods of [3, 4] - Holographic approach to embedding ... of the latent watermarks in photos is put in a basis of the present technology. It is established that a Fourier transformation of watermarks embedded in the frequency domain with a shift relative to the coordinate origin is a digital Fourier hologram. Or otherwise speaking, embedding of a watermark in an image spectrum, it is equivalent to embedding of a watermark the hologram in the image.
The photoimage is read by the CCD-scanner, is exposed to transformations for detection of a hidden watermark, and then the watermark is shown on the monitor. In figure, the watermark is submitted as a mark copyright ©.
For realization of return procedure, i.e. procedure of restoration of a watermark from the hologram, it is enough to execute two-dimensional transformation Fourier, if parameters of synthesis of the hologram, and in particular spatial carrier are certainly known. In real time, this function is realized by means of digital signal processors (DPS). For example, DSP firms Texas Instruments, allow to execute this procedure for shares of second. During restoration of a watermark, it is possible to observe both the restored object, and its holographic image:
The major element of any information system is enciphering the confidential information. The considered approach is not exception - two-dimensional cryptograms are integrally built in a chain of transformations of two-dimensional images:
Stability of the code is defined exclusively by stability of a confidential key. Thus, analog execution of means of protection of object of identification (a photo of the owner) and the latent character of built in data represents "poorly attractive" object for digital breaking, and attach of a cryptographic subsystem to the steganographic system of concealment of data provides a powerful barrier to not authorized intervention.
At a stage of working off of algorithms researches on embedding of the latent watermarks in carriers on a paper and plastic basis have been conducted. These researches are presented on page Results of experiments.... The special software is developed for carrying out of experiments, allowing to change level of stability to influence of procedures of a photo printing and scanning by means of factor of strengthening of a signal of a watermark: a software package the Photographic watermark.
|R e f e r e n c e s:|
1. "Successful breaking of the prototype of the RFID-passport (russian)": iXBT
2. The electronic passport: the microchip is not protected from a fake. // the Computer newspaper [russian]
3. M. V. Smirnov, "Holographic approach to embedding hidden watermarks in a photographic image," J. Opt. Technol. 72, 464-468
or http://jot.osa.org/abstract.cfm?id=85832 or [russian, PDF file]
4. M. V. Smirnov. "The holographic approach to embedding the latent water marks in the photos: "HOLOGRAPHY EXPO-2005" II-th international Forum, 27-29 Sep. 2005, Moscow. Report thesis, p. 43
5. "The latent transfer and storage of the confidential information on the Internet and cellular communication"
6. Results of experiments of embedding of the latent watermarks in facsimiles on a paper and plastic basis.
|The elements of the probabilistic analysis of the Forex market||http://www.smirnov.sp.ru/forex_html/forex3eng.html|
|Currency Prediction Software of market FOREX||http://www.smirnov.sp.ru/forex_html/usd_euro15.html|
|Technology of a GUARD of text files from unauthorized copying||http://www.smirnov.sp.ru/graphic_text/pastxt1eng.html|
|Software for evaluating of ground resolution of remote sensing optical-system||http://www.smirnov.sp.ru/special/index.html|
|Objective estimation of digital scanners quality||http://www.smirnov.sp.ru/scanner/scan02.html|
|Restoration of images||http://www.smirnov.sp.ru/scanner/filter/index.html|
|Visual Gallery Manager 2.0||http://www.smirnov.sp.ru/vgm20/index.html|
|Physical simulation of optical-electronic system of high-resolution||http://www.smirnov.sp.ru/simult_oes/index.html|
|Technology of counteraction to falsification of credit cards||http://www.smirnov.sp.ru/watermark/cards/card_eng.html|
|Free Advertisment. Free Bulletin Board (english).||http://www.smirnov.sp.ru/wwwboard/engboard.html|
|Free Advertisment. Free Bulletin Board (russian).||http://www.smirnov.sp.ru/wwwboard/rusboard.html|
|Chat: CGI/Java Integration||http://www.smirnov.sp.ru/wwwboard/chatlink.html|
|The latent transfer and storage of the confidential information on the Internet and cellular communication||http://www.smirnov.sp.ru/watermark/conf_data/guarding_eng.html|
St. Petersburg, Russia