Digital watermarking scheme with visual cryptography

被引:0
|
作者
Hsu, Ching-Sheng
Tu, Shu-Fen
机构
关键词
digital watermarking; modular arithmetic; visual cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The aim of this paper is to propose a novel digital watermarking scheme using visual cryptography. A binary image, called watermark, is split into two shares via a 2-out-of-2 visual secret sharing scheme. Then, one of the shares is embedded into the host image, and the other is held by the owner. When proving the ownership, the owner has to extract the embedded share and recover the watermark with his/her own share. Based on the security property of visual cryptography, our scheme can make sure that the two shares cannot leak any information about the watermark. Unlike other researchers' method, our scheme needs not a trust third party to avoid the multiple claming problem. Besides, the experimental results show that our scheme can resist most of common attacks.
引用
收藏
页码:659 / 662
页数:4
相关论文
共 50 条
  • [31] A LOSSLESS WATERMARKING USING VISUAL CRYPTOGRAPHY AUTHENTICATION
    Wang, Yuh-Rau
    Lin, Wei-Hung
    Yang, Ling
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1109 - 1113
  • [32] A TTP watermarking protocol based on visual cryptography
    Baiyan Wu
    Yuwei Peng
    Chao Wang
    [J]. Multimedia Tools and Applications, 2022, 81 : 41079 - 41101
  • [33] A TTP watermarking protocol based on visual cryptography
    Wu, Baiyan
    Peng, Yuwei
    Wang, Chao
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (28) : 41079 - 41101
  • [34] A Novel Visual Cryptography Scheme
    Jena, Debasish
    Jena, Sanjay Kumar
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 207 - 211
  • [35] Indirect visual cryptography scheme
    Yang, Xiubo
    Li, Tuo
    Shi, Yishi
    [J]. AOPC 2015: IMAGE PROCESSING AND ANALYSIS, 2015, 9675
  • [36] On the randomness of visual cryptography scheme
    Guo, Teng
    Liu, Feng
    Wu, ChuanKun
    Ren, YaWei
    Wang, Wen
    [J]. 2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 391 - 394
  • [37] Nested visual cryptography scheme
    Yuan Zhonglan
    Xia Guangsheng
    Du Ye
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (03) : 459 - 463
  • [38] A verifiable visual cryptography scheme
    Han, Yan-Yan
    Wang, Su-Ying
    Hu, Yu-Pu
    He, Wen-Cai
    [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (01): : 86 - 89
  • [39] Color visual cryptography scheme
    Yi, Feng
    Wang, Daoshun
    Dai, Yiqi
    [J]. Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2006, 18 (11): : 1770 - 1775
  • [40] A Verifiable Visual Cryptography Scheme
    Yu, Bin
    Fang, Liguo
    Xu, Xiaohui
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 908 - 911