We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Halftone Image Watermarking based on Visual Cryptography

by Jaishri Chourasia, M. B. Potdar, Abdul Jhummarwala, Keyur Parmar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 20
Year of Publication: 2012
Authors: Jaishri Chourasia, M. B. Potdar, Abdul Jhummarwala, Keyur Parmar
10.5120/5805-8010

Jaishri Chourasia, M. B. Potdar, Abdul Jhummarwala, Keyur Parmar . Halftone Image Watermarking based on Visual Cryptography. International Journal of Computer Applications. 41, 20 ( March 2012), 1-5. DOI=10.5120/5805-8010

@article{ 10.5120/5805-8010,
author = { Jaishri Chourasia, M. B. Potdar, Abdul Jhummarwala, Keyur Parmar },
title = { Halftone Image Watermarking based on Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 20 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number20/5805-8010/ },
doi = { 10.5120/5805-8010 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:04.133840+05:30
%A Jaishri Chourasia
%A M. B. Potdar
%A Abdul Jhummarwala
%A Keyur Parmar
%T Halftone Image Watermarking based on Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 20
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we have proposed digital watermarking scheme for halftone images based on visual cryptography scheme. The scheme does not embed the watermark directly on the halftone image instead watermark will be divided into the parts called as shares. The scheme not only protects the watermark but also provides an effective copyright protection scheme. At the time of watermark embedding verification share is generated and at the time of watermark extraction master share is generated using (2, 2) visual cryptography scheme. Verification share and master share are used to extract the watermark pattern. The experimental results show that the scheme is robust and transparent against various watermarking attack.

References
  1. Chunlin Song, Sud Sudirman and Madjid Merabti, "Robust Digital Image Watermarking using Region Adaptive Embedding Technique", IEEE, pp. 378-382, 2010.
  2. Y-C Hou, P-M Chen, "An Asymmetric Watermarking Scheme based on Visual Cryptography", In Proceedings of ICSP, Vol. 2, pp. 992 -995, (2000).
  3. Ming Sun Fu. Oscar C. Au, "Joint Visual Cryptography and Watermarking", IEEE International Conference on Multimedia and Expo, pp-975-978 (2004).
  4. Wei Qiao, Hongdong Yin, Huaqing Liang, "A Kind of Visual Cryptography Scheme For Color Images Based on Halftone Technique" In proceeding of IEEE, pp. 393-395, (2009).
  5. Nitty Sarah Alex, L. Jani Anbarasi, "Enhanced Image Secret Sharing via Error Diffusion in Halftone Visual Cryptography" In proceeding if IEEE, pp. 393-397, (2011).
  6. A. Shamir,. "How to Share a secret",Communications of the ACM, vol. 22, pp. 612-613, 1996.
  7. M. Naor, and A. Shamir, "Visual Cryptography", Advances in Cryptology – Eurocrypt'94 Proceeding, LNCS Vol. 950, Springer-Verlag, pp. 1-12, 1995. .
  8. M. Naor and A. Shamir, "Visual Cryptography II:Improving the Contrast Via the Cover Base",Cambridge Workshop on Protocols, 1996.
  9. Hao Luo, Faxin Yu, "Data Hiding in Image Size Invariant Visual Cryptography" In proceeding of IEEE, pp. 273-276, (2008).
  10. N. Krishna Prakash, Prof. S. Govindaraju, "Visual Secret Sharing Schemes for Color Images using Halftoning", In proceeding of International Conference on Computational Intelligence and Multimedia Applications, IEEE, pp. 174-178, (2007).
  11. Zhi Zhou,Gonalzo R. Arce and Giovanni Di Crescenzo, "Halftone Visual Cryptography", IEEE Transactions On Image Processing, Vol. 15, NO. 8, pp. 2441-2453, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Watermarking Visual Cryptography Scheme Error Diffusion Halftone