Affiliation:
1. Columbia University, New York, NY
Abstract
We introduce
FontCode
, an information embedding technique for text documents. Provided a text document with specific fonts, our method embeds user-specified information in the text by perturbing the glyphs of text characters while preserving the text content. We devise an algorithm to choose unobtrusive yet machine-recognizable glyph perturbations, leveraging a recently developed generative model that alters the glyphs of each character continuously on a font manifold. We then introduce an algorithm that embeds a user-provided message in the text document and produces an encoded document whose appearance is minimally perturbed from the original document. We also present a glyph recognition method that recovers the embedded information from an encoded document stored as a vector graphic or pixel image, or even on a printed paper. In addition, we introduce a new error-correction coding scheme that rectifies a certain number of recognition errors. Lastly, we demonstrate that our technique enables a wide array of applications, using it as a text document metadata holder, an unobtrusive optical barcode, a cryptographic message embedding scheme, and a text document signature.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Graphics and Computer-Aided Design
Reference54 articles.
1. Martín Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro etal 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. Retrieved from http://tensorflow.org/. Martín Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro et al. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. Retrieved from http://tensorflow.org/.
2. A. Adobe. 2001. Manager’s introduction to Adobe eXtensible metadata platform. The Adobe XML Metadata Framework. 1--18. A. Adobe. 2001. Manager’s introduction to Adobe eXtensible metadata platform. The Adobe XML Metadata Framework. 1--18.
3. Text Steganographic Approaches: A Comparison
4. High-order statistical texture analysis––font recognition applied
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Estimated Judge Reliabilities for Weighted Bradley-Terry-Luce Are Not Reliable;Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining;2024-08-24
2. Watermarking Text Documents With Watermarked Fonts;Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security;2024-06-24
3. Enhanced Screen Shooting Resilient Document Watermarking;ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP);2024-04-14
4. InvertedFontNet: Font Watermarking based on Perturbing Style Manifold;ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP);2024-04-14
5. Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer;IEEE Transactions on Information Forensics and Security;2024