A highly robust and secure image watermarking based on classification and visual cryptography

被引:26
|
作者
Fatahbeygi, Ali [1 ]
Tab, Fardin Akhlaghian [1 ]
机构
[1] Univ Kurdistan, Dept Comp Engn, Sanandaj, Iran
关键词
Image watermarking; Visual cryptography; Image blocks classification; Support vector machine; Robust blocks; COPYRIGHT PROTECTION SCHEME; DISCRETE WAVELET TRANSFORM; DWT; DCT;
D O I
10.1016/j.jisa.2019.01.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper a new robust image watermarking algorithm based on blocks classification and visual cryptography (VC) is presented. First the original image is decomposed into non-overlapping blocks. Then, we use canny edge detection and the support vector machine (SVM) classification method to categorize these blocks into smooth and non-smooth classes. The VC technique is used to generate two image shares: A master share that is constructed according to the block classification results and an owner share generated by using the master share together with a binary watermark. To verify the ownership of the image, the watermark can be retrieved by stacking the master share and the owner share. By skipping blocks which are not robust against attacks, the robustness of our proposed watermarking method is significantly improved. Our method is completely imperceptible because the watermark pattern is concealed without modifying the original host image. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:71 / 78
页数:8
相关论文
共 50 条
  • [1] A New Robust Semi-blind Image Watermarking Based on Block Classification and Visual Cryptography
    Fatahbeygi, Ali
    Akhlaghian, Fardin
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION AND IMAGE ANALYSIS (IPRIA), 2015,
  • [2] Robust Video Watermarking Scheme Based on Visual Cryptography
    Singh, Th. Rupachandra
    Singh, Kh. Manglem
    Roy, Sudipta
    [J]. PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 872 - 877
  • [3] Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography
    Xiong, Lizhi
    Han, Xiao
    Yang, Ching-Nung
    Shi, Yun-Qing
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (01) : 75 - 91
  • [4] A Secure Image Watermarking Using Visual Cryptography and discrete fractional Fourier transform
    Wang, Hong-Yang
    [J]. APPLIED DECISIONS IN AREA OF MECHANICAL ENGINEERING AND INDUSTRIAL MANUFACTURING, 2014, 577 : 754 - 757
  • [5] Medical Image Watermarking for Copyright Protection Based on Visual Cryptography
    Benyoussef, Meryem
    Mabtoul, Samira
    El Marraki, Mohamed
    Aboutajdine, Driss
    [J]. 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 93 - 98
  • [6] Digital Image Watermarking Scheme Based on Visual Cryptography and SVD
    Mallick, Ajay Kumar
    Priyanka
    Maheshkar, Sushila
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 589 - 598
  • [7] Visual cryptography based watermarking
    Cimato, Stelvio
    Yang, James C. N.
    Wu, Chih-Cheng
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8363 : 91 - 109
  • [8] Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography
    Shao, Zhuhong
    Shang, Yuanyuan
    Zeng, Rui
    Shu, Huazhong
    Coatrieux, Gouenou
    Wu, Jiasong
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2016, 48 : 12 - 21
  • [9] Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms
    Benyoussef, Meryem
    Mabtoul, Samira
    El Marraki, Mohamed
    Aboutajdine, Driss
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2015, 11 (04): : 495 - 508
  • [10] Repeating image watermarking technique by the visual cryptography
    Wang, CC
    Tai, SC
    Yu, CS
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (08) : 1589 - 1598