Joint visual cryptography and watermarking

被引:0
|
作者
Fu, MS [1 ]
Au, OC [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we discuss how to use watermarking technique for visual cryptography. Both halftone watermarking and visual cryptography involve a hidden secret image. However, their concepts are different. For visual cryptography, a set of share binary images is used to protect the content of the hidden image. The hidden image can only be revealed when enough share images are obtained. For watermarking, the hidden image is usually embedded in a single halftone image while preserving the quality of the watermarked halftone image. In this paper, we proposed a Joint Visual-cryptography and watermarking (JVW) algorithm that has the merits of both visual cryptography and watermarking.
引用
收藏
页码:975 / 978
页数:4
相关论文
共 50 条
  • [1] Joint multiple watermarking and non-expansion visual cryptography
    Luo, Hao
    Zhao, Zhenfei
    Pan, Jeng-Shyang
    Lu, Zhe-Ding
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 48 - +
  • [2] Multiple Watermarking in Visual Cryptography
    Luo, Hao
    Lu, Zhe-Ming
    Pan, Jeng-Shyang
    [J]. DIGITAL WATERMARKING, PROCEEDINGS, 2008, 5041 : 60 - +
  • [3] Visual cryptography based watermarking
    Cimato, Stelvio
    Yang, James C. N.
    Wu, Chih-Cheng
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8363 : 91 - 109
  • [4] A Watermarking Technique based on Visual Cryptography
    Surekha, B.
    Swamy, G. N.
    Rao, K. Srinivasa
    Kumar, A. Ravi
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 470 - 473
  • [5] Self Watermarking based on Visual Cryptography
    Hassan, Mahmoud A.
    Khalili, Mohammed A.
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8, 2005, 8 : 159 - 162
  • [6] Digital watermarking scheme with visual cryptography
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    [J]. IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 659 - 662
  • [7] PROGRESSIVE VISUAL CRYPTOGRAPHY WITH WATERMARKING FOR MEANINGFUL SHARES
    Jithi, P., V
    Nair, Anitha T.
    [J]. 2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S), 2013, : 394 - 401
  • [8] Repeating image watermarking technique by the visual cryptography
    Wang, CC
    Tai, SC
    Yu, CS
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (08) : 1589 - 1598
  • [9] A LOSSLESS WATERMARKING USING VISUAL CRYPTOGRAPHY AUTHENTICATION
    Wang, Yuh-Rau
    Lin, Wei-Hung
    Yang, Ling
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1109 - 1113
  • [10] A TTP watermarking protocol based on visual cryptography
    Baiyan Wu
    Yuwei Peng
    Chao Wang
    [J]. Multimedia Tools and Applications, 2022, 81 : 41079 - 41101