CFP last date
20 December 2024
Reseach Article

A Multiple Watermarking Technique for Images based on Visual Cryptography

by B Surekha, GN Swamy, K Srinivasa Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 11
Year of Publication: 2010
Authors: B Surekha, GN Swamy, K Srinivasa Rao
10.5120/236-390

B Surekha, GN Swamy, K Srinivasa Rao . A Multiple Watermarking Technique for Images based on Visual Cryptography. International Journal of Computer Applications. 1, 11 ( February 2010), 77-81. DOI=10.5120/236-390

@article{ 10.5120/236-390,
author = { B Surekha, GN Swamy, K Srinivasa Rao },
title = { A Multiple Watermarking Technique for Images based on Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 11 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 77-81 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number11/236-390/ },
doi = { 10.5120/236-390 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:46:06.246184+05:30
%A B Surekha
%A GN Swamy
%A K Srinivasa Rao
%T A Multiple Watermarking Technique for Images based on Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 11
%P 77-81
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the explosive growth of internet technology robust methods are being developed to protect the proprietary rights of the multimedia. In this paper, an invisible watermarking technique is proposed, to embed multiple binary watermarks into digital images based on the concept of Visual Cryptography (VC). Unlike traditional watermarking schemes, the watermarks are not embedded directly into the digital image. Instead, the proposed method constructs independent Master Shares for the authors according to the original image and the corresponding watermarks. When piracy happens, the authors can show their shares to reveal the watermarks. The proposed scheme embeds the watermarks without modifying the original host image. In addition, the size of the watermarks is not restricted to being smaller than that of the original host image. Experimental results prove that, the proposed watermarking technique is resilient to several common attacks.

References
  1. Anderson R. J., Ed.1996., Information Hiding, in The 1st International Workshop, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1174, 1-7.
  2. Braudaway G. W., K. A. Magerlein, and F. Mintzer.1996, Protecting Publicly-available Images with a Visible Image Watermark, in the Proceedings of SPIE, 2659, 126-133.
  3. Chang, C.C., Chaung ,J. C.2002., An Image Intellectual Property Protection Scheme for Gray-level Images using Visual Secret Sharing Strategy, Pattern Recognition Letters, 23, 931-941.
  4. Chang, C. C., Hsiao, J. Y., and Yeh, J. C.2002., A Color Image Copyright Protection Scheme based on Visual Cryptography and Discrete Cosine Transform, The Imaging Science Journal, 50, 133-140.
  5. Cox, I. J.,M. L. Miller, and J. A. Bloom. 2002, Digital Watermarking, New York: Morgan Kaufmann Publishers Inc., San Fransisco, CA.
  6. Cox, I. J., Kilian, J., Leighton, T., and Shamoon, T..1997, Secure Spread Spectrum Watermarking for Multimedia, In IEEE Transactions on Image Processing, 6(12), pp. 1673-1687.
  7. Fu M. S., 0. C. Au. 2004, Joint Visual Cryptography and Watermarking, In Proceedings of IEEE International Conference on Multimedia and Expo, 975-978.
  8. Hawkes W., A. Yasinsac, C. Clin. 2000, An Application of Visual Cryptography to Financial Documents, Technical report TR001001, Florida State University .
  9. Hou Y-C, P-M Chen.2002, An Asymmetric Watermarking Scheme based on Visual Cryptography, In Proceedings of ICSP, 2, 992 -995.
  10. Hwang R.2002, A Digital Image Copyright Protection Scheme based on Visual Cryptography, Tamkang Journal of science and Engineering,.3(2), 97-106.
  11. Kutter M. and F. A. P. Petitcolas. 1999, A fair benchmark for image watermarking systems, In Proceedings of Security and Watermarking of Multimedia Contents, 226-239.
  12. Langelaar G.C., J. van der Lubbe and J. Biemond. 1996, Copy protection for multimedia data based on labelling techniques`, 17th Symposium on Information Theory, Benelux.
  13. Noar M and A. Shamir. 1995, Visual Cryptography, Advances in Cryptography Eurocrypt'94, Lecture Notes in Computer Science, Springer-Verlag,Berlin, 950, 1-12.
  14. http://sipi.usc.edu/database
Index Terms

Computer Science
Information Sciences

Keywords

Copyright Protection Cryptography Digital Watermarking Multiple Watermarks Visual Cryptography