Robust Watermarking for Multiple Images and Users Based on Visual Cryptography

  • Sheng-Shiang Chang
  • Chih-Hung Lin
  • Tzung-Her Chen
  • Kai-Siang Lin
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 238)


In this paper, we proposed a robust watermarking worked for multiple images and multiple users. This scheme adopted polynomial-based image secret sharing, DWT transform, and chaos technique. Secret sharing scheme provides better efficient on protecting copyright with multiple users, specifically in some situation, we are not easy to recover watermark by all participants. In order to verify copyright easier, we use polynomial-based image secret sharing scheme to reach a supervised verification. Any two users whose owns capability can recover the watermark with the trust authority. The experimental result shows that this scheme is efficient and robust.


watermarking visual cryptography wavelet transform 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Hou, Y.C., Chen, P.M.: An asymmetric watermarking scheme based on visual cryptography. In: Proceedings of WCCC-ICSP, 5th Int. Conf. on Signal Processing, pp. 992–995 (2000)Google Scholar
  2. 2.
    Hsu, C.S., Hou, Y.C.: Copyright protection scheme for digital images using visual cryptography and sampling methods. Optical Engineering 44(7), 077003.1–077003.10 (2005)Google Scholar
  3. 3.
    Lou, D.C., Tso, H.K., Liu, J.L.: A copyright protection scheme for digital images using visual cryptography technique. Computer Standards & Interfaces 29(1), 1530–1541 (2006)Google Scholar
  4. 4.
    Liu, F., Wu, C.K.: Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners. Information Security (IET) 5(2), 121–128 (2011)CrossRefGoogle Scholar
  5. 5.
    Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Tai, G.-C., Chang, L.-W.: Visual cryptography for digital watermarking in still images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004, Part II. LNCS, vol. 3332, pp. 50–57. Springer, Heidelberg (2004)Google Scholar
  7. 7.
    Voyatzis, G., Pitas, I.: Applications of toralautomorphisms in image watermarking. In: Proceedings of Image Processing, vol. 2, pp. 237–240. Thessaloniki Univ., Greece (1996)Google Scholar
  8. 8.
    Wang, M.S., Chen, W.C.: A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Computer Standards & Interfaces 31(4), 757–762 (2009)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Sheng-Shiang Chang
    • 1
  • Chih-Hung Lin
    • 2
  • Tzung-Her Chen
    • 1
  • Kai-Siang Lin
    • 1
  1. 1.Department of Computer Science and Information EngineeringNational Chiayi UniversityChia-Yi CityTaiwan
  2. 2.Graduate Institute of Mathematics and Science EducationNational Chiayi UniversityMinxiong TownshipTaiwan

Personalised recommendations