Abstract
Visual cryptograph can represent the secret image by several different shares of binary images. It is hard to perceive any clues about a secret image from individual shares. The secret message is revealed when parts or all of these shares are aligned and stacked together. In this paper, a novel public robust digital watermarking scheme based on visual cryptography is proposed. A binary logo is used to represent the ownership of the host image. The logo is used to generate a private sharing image and a public sharing image by visual cryptography algorithms. We use the public sharing image as the watermark embedded in the host image. An error correction-coding scheme is also used to protect the watermark. Simulation shows that our proposed watermarking algorithm is robust against various attacks indeed. Our algorithm and public share image can be open to the public, but only the owner, who uses the private sharing image of the ownership logo, can retrieve the logo for ownership. If there is an argument between the owner and the attacker the private sharing image can be provided to the arbitrator to resolve the ownership issue more convincingly.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Naor, M., Shamir, A.: Visual cryptography II, Improving the contrast via, the cover base. In: Security Protocols Work-shop, pp. 197–202 (1996)
Xiang, C.G.B., Xia, G., Arce, G.R.: A Multisolution Watermark for Digital Images. In: 1997 International Conference on Image Processing (ICIP 1997), Santa Barbara, CA, July 1997, IEEE Signal Processing Society, Los Alamitos (1997)
Swanson, M.D., Zhu, B., Tewfik, A.H.: Multiresolution Scene-Based Video Watermarking Using Perceptual Models. IEEE Journal on Selected Areas in Comm., special issue on Copyright and Privacy Protection 16(4), 540–555 (1996)
Chen, Y.-C., Chang, L.-W.: A Secure and Robust Digital Watermarking Technique by the block cipher RC6 and Secure Hash Algorithm, pp. 518–521. IEEE, Los Alamitos (2001)
Naor, M., Pinkas, B.: Visual Authentication and identification. In: Kaliski Jr., B. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)
Stinson, D.: Visual cryptography and threshold scheme. IEEE Potential, 13–19 (February/March 1998)
Sun, Q.B., Feng, P.R., Deng, R.: An Optical Watermarking Solution for Authenticating Printed Documents. IEEE Potential, 66–70 (2001)
Cox, I., Kilian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia, Technical Report 95-10, NEC Research Institute (1995)
Hou, Y.-C., Chen, P.-M.: Asymmetric watermarking scheme based on visual cryptography. In: 5th International Conference on Signal Processing Proceedings, WCCC-ICSP 2000, August 21-25, vol. 2, pp. 992–995 (2000)
Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. In: Proceedings of 2003 International Conference on Image Processing 2003, September 14-17, vol. 1, pp. 521–524 (2003)
Stinson, D.R.: An introduction to visual cryptography, presented at Public Key Solutions (1997), Available at http://bibd.unl.edu/~stinson/VCS-PKS.ps
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tai, GC., Chang, LW. (2004). Visual Cryptography for Digital Watermarking in Still Images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds) Advances in Multimedia Information Processing - PCM 2004. PCM 2004. Lecture Notes in Computer Science, vol 3332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30542-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-30542-2_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23977-2
Online ISBN: 978-3-540-30542-2
eBook Packages: Computer ScienceComputer Science (R0)