CFP last date
20 January 2025
Reseach Article

A Visual Cryptography based Watermarking Scheme Incorporating the Concepts of Homogeneity Analysis and Singular Value Decomposition

by Priyanka Singh, Suneeta Agarwal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 16
Year of Publication: 2013
Authors: Priyanka Singh, Suneeta Agarwal
10.5120/13950-1115

Priyanka Singh, Suneeta Agarwal . A Visual Cryptography based Watermarking Scheme Incorporating the Concepts of Homogeneity Analysis and Singular Value Decomposition. International Journal of Computer Applications. 80, 16 ( October 2013), 1-9. DOI=10.5120/13950-1115

@article{ 10.5120/13950-1115,
author = { Priyanka Singh, Suneeta Agarwal },
title = { A Visual Cryptography based Watermarking Scheme Incorporating the Concepts of Homogeneity Analysis and Singular Value Decomposition },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 16 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number16/13950-1115/ },
doi = { 10.5120/13950-1115 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:40.820214+05:30
%A Priyanka Singh
%A Suneeta Agarwal
%T A Visual Cryptography based Watermarking Scheme Incorporating the Concepts of Homogeneity Analysis and Singular Value Decomposition
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 16
%P 1-9
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A visual cryptography based watermarking scheme incorporating the concepts of singular value decomposition (SVD) and the homogeneity analysis of the cover image is proposed here. Firstly, feature vectors are created from the singular values of the homogeneous blocks and thereby classified using the k-medoid clustering technique. A master share is then constructed based on the clustering result and thereafter, combined with the secret binary image (watermark) ownership share is build up. This ownership share is registered with the certificate authority in case to resolve any dispute regarding rightful ownership of the image in future. A two-out-of-two visual cryptography scheme is being used in the proposed methodology and robustness validated by applying comprehensive set of attacks. The peak signal to noise ratio (PSNR) and normalized cross correlation (NCC) metric values are used for evaluation of the scheme. Higher values of these metrics establish the appropriateness of the proposed methodology as compared to the other state of art schemes for copyright protection.

References
  1. Yu, Y. H. , Chang C. C. , and Hu, Y. C. 2005. Hiding secret data in images via predictive coding, Pattern Recognition 38 (5), 691–705.
  2. Chu, S. C. , Roddick, J. F. , Lu, Z. M. , and Pan, J. S. 2004 A digital image water-marking method based on labeled bisecting clustering algorithm, IEICE Transactions on Fundamentals E87-A (1), 282–285.
  3. Chang, C. C. , Chen T. S. , and Chung, L. Z. 2002 A steganographic method based upon JPEG and quantization table modification, Information Sciences 141, 123–138.
  4. Wu, D. C. , and Tsai, W. H. 2003 A steganographic method for images by pixel-value differencing, Pattern Recognition Letters 24, 1613–1626.
  5. Hsu C. T. , and Wu, J. L. 1998 Multiresolution watermarking for digital images, IEEE on Circuits and Systems II: Analog and Digital Signal Processing, vol. 45(8), 1097–1101.
  6. Cox, I. J. , Kilian J. , Leighton, F. T. , and Shamoon, T. 1997 Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing 6 (12) , 1673–1687.
  7. Wang, Y. , Doherty, J. F. , and Van Dyck, R. E. 2002 A wavelet-based watermarking algorithm for ownership verification of digital images, IEEE Transactions on Image Processing 11 (2), 77–88.
  8. Joo, S. , Suh, Y. , Shin J. , Kikuchi H. , and Cho, S. J. 2002 A new robust watermark embedding into wavelet DC components, ETRI Journal 24 (5), 401–404.
  9. Das, T. K. , and Maitra, S. 2004 Cryptanalysis of correlation-based watermarking schemes using single watermarked copy, IEEE Signal Processing Letters 11 (4), 446–449.
  10. Celik, M. U. , Sharma, G. , Tekalp, A. M. , and Saber, E. 2005 Lossless generalized-LSB data embedding, IEEE Transactions on Image Processing 14 (2), 253–266.
  11. Tian, J. 2003 Reversible data embedding using a difference expansion, IEEE Transactions on Circuits and Systems for Video Technology 13 (8), 890–896.
  12. Fridrich, J. , Goljan, M. , and Du, R. 2002 Lossless data embedding for all image formats, Proceedings of SPIE Photonics West 4675, Electronic Imaging, Security and Watermarking of Multimedia Contents (San Jose, California), 572–583.
  13. Wang, C. C. , Tai, S. C. , and Yu, C. S. 2000 Repeating image watermarking technique by the visual cryptography, IEICE Transactions on Fundamentals E83-A (8) , 1589–1598.
  14. Hsieh, S. L. , and Huang, B. Y. 2004 A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation, Proceedings of International Computer Symposium, 661–666.
  15. Chang, C. C. , and Chung, J. C. 2002 An image intellectual property protection scheme for gray-level images using visual secret sharing strategy, Pattern Recognition Letters 23, 931–941.
  16. Lee, W. B. , and Chen, T. H. 2002 A public verifiable copy protection technique for still image, Journal of Systems and Software 62, 195–204.
  17. Naor, N. , and Shamir, A. 1995 Visual cryptography, advances in cryptology: Eurocrypt'94, LNCS 950, 1–12.
  18. Lou, D. C. , and Sung, C. H 2004 A steganographic scheme for secure communications based on the chaos and Euler theorem, IEEE Transactions on Multimedia 6 (3) , 501–509.
  19. Chang, C. C. , Hsiao, J. Y. , and Yeh, J. C. 2002 A color image copyright protection scheme based on visual cryptography and discrete Fourier transform, Imaging Science Journal, 50, 133-140.
  20. Hsu, C. S. , and Hou, Y. C. 2005 Copyright protection scheme for digital image using visual cryptography and sampling methods, Optical Engineering, 44(7), 077003-1-77003-10.
  21. Hsu, C. S. , and Hou, Y. C. 2005 A visual cryptography and statistics based method for ownership identification of digital images, World Academy of Science and Technology, 2, 172-175.
  22. Singh, K. M. 2009 Dual Watermarking Scheme for Copyright Protection", International Journal of Computer Science and Engineering System, ISSN 0973 4406, 3(2).
  23. Hwang, R. J. 2000 A digital image copyright protection scheme based on visual cryptography, Tamkang journal of Science and Engineering, 3(2), 97-106.
  24. Sleit, A. , and Abusitta, A. 2008 A visual cryptography based watermark technology for individual and group images, Systems, Cybernetics and Informatics, 5(2), 24-32.
  25. Surekha, B. , and Swamy, G. N. 2011 A spatial domain public image watermarking, International Journal of Security and Applications, 5(1), 1-11.
  26. Wang, M. S. , and Chen, W. C. 2009 A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography, Computer Standards and Interfaces, 31, 757-762.
Index Terms

Computer Science
Information Sciences

Keywords

Homogeneity Analysis Singular Value Decomposition (SVD) Visual Cryptography (VC) Peak Signal to Noise Ratio (PSNR) Normalized Cross Correlation (NCC).