Skip to main content

Visual Cryptography for Digital Watermarking in Still Images

  • Conference paper
Advances in Multimedia Information Processing - PCM 2004 (PCM 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3332))

Included in the following conference series:

Abstract

Visual cryptograph can represent the secret image by several different shares of binary images. It is hard to perceive any clues about a secret image from individual shares. The secret message is revealed when parts or all of these shares are aligned and stacked together. In this paper, a novel public robust digital watermarking scheme based on visual cryptography is proposed. A binary logo is used to represent the ownership of the host image. The logo is used to generate a private sharing image and a public sharing image by visual cryptography algorithms. We use the public sharing image as the watermark embedded in the host image. An error correction-coding scheme is also used to protect the watermark. Simulation shows that our proposed watermarking algorithm is robust against various attacks indeed. Our algorithm and public share image can be open to the public, but only the owner, who uses the private sharing image of the ownership logo, can retrieve the logo for ownership. If there is an argument between the owner and the attacker the private sharing image can be provided to the arbitrator to resolve the ownership issue more convincingly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  2. Naor, M., Shamir, A.: Visual cryptography II, Improving the contrast via, the cover base. In: Security Protocols Work-shop, pp. 197–202 (1996)

    Google Scholar 

  3. Xiang, C.G.B., Xia, G., Arce, G.R.: A Multisolution Watermark for Digital Images. In: 1997 International Conference on Image Processing (ICIP 1997), Santa Barbara, CA, July 1997, IEEE Signal Processing Society, Los Alamitos (1997)

    Google Scholar 

  4. Swanson, M.D., Zhu, B., Tewfik, A.H.: Multiresolution Scene-Based Video Watermarking Using Perceptual Models. IEEE Journal on Selected Areas in Comm., special issue on Copyright and Privacy Protection 16(4), 540–555 (1996)

    Google Scholar 

  5. Chen, Y.-C., Chang, L.-W.: A Secure and Robust Digital Watermarking Technique by the block cipher RC6 and Secure Hash Algorithm, pp. 518–521. IEEE, Los Alamitos (2001)

    Google Scholar 

  6. Naor, M., Pinkas, B.: Visual Authentication and identification. In: Kaliski Jr., B. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)

    Google Scholar 

  7. Stinson, D.: Visual cryptography and threshold scheme. IEEE Potential, 13–19 (February/March 1998)

    Google Scholar 

  8. Sun, Q.B., Feng, P.R., Deng, R.: An Optical Watermarking Solution for Authenticating Printed Documents. IEEE Potential, 66–70 (2001)

    Google Scholar 

  9. Cox, I., Kilian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia, Technical Report 95-10, NEC Research Institute (1995)

    Google Scholar 

  10. Hou, Y.-C., Chen, P.-M.: Asymmetric watermarking scheme based on visual cryptography. In: 5th International Conference on Signal Processing Proceedings, WCCC-ICSP 2000, August 21-25, vol. 2, pp. 992–995 (2000)

    Google Scholar 

  11. Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. In: Proceedings of 2003 International Conference on Image Processing 2003, September 14-17, vol. 1, pp. 521–524 (2003)

    Google Scholar 

  12. Stinson, D.R.: An introduction to visual cryptography, presented at Public Key Solutions (1997), Available at http://bibd.unl.edu/~stinson/VCS-PKS.ps

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tai, GC., Chang, LW. (2004). Visual Cryptography for Digital Watermarking in Still Images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds) Advances in Multimedia Information Processing - PCM 2004. PCM 2004. Lecture Notes in Computer Science, vol 3332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30542-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30542-2_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23977-2

  • Online ISBN: 978-3-540-30542-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics