Skip to main content

4-Share VCS Based Image Watermarking for Dual RST Attacks

  • Conference paper
  • First Online:
Computational Vision and Bio Inspired Computing

Part of the book series: Lecture Notes in Computational Vision and Biomechanics ((LNCVB,volume 28))

Abstract

The startling improvement about web need aggravated the transmission, conveyance Also right to advanced networking really useful. Therefore, networking makers need aid more usually managing illegal What’s more unapproved utilization from claiming their productions. In our proposed approach, first enter the user name and password then generate QR-code using zxing library that will converted into the three shares using Binary Visual cryptography algorithm. Now share-4 is save in the database that is for future reference at receiver side. Remaining share-1, share-2 and share-3 are embedding into the Red, Green and Blue-component LL bit using of block DWT-SVD and Pseudo Zernike moment. After embedding add RGB Component. Now Color watermark image transfer from the network. As in network there are different attackers apply combination of Rotation, Scale and Translation attacks on the color watermark image. For recover the attacks first apply Pseudo Zernike moment, Surf feature on R, G and B-component they will extract the attacks pixel and recover the scale-angle using affine transformation. Now share-1, share-2, share-3 and another share-4 is in data base so we will apply EX-OR operation to get the QR-code. The final QR-code is decoded and we get the user name and password. This research work can give a way for providing authentication to all online Services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Delphin Raj, K.M, Nancy, V.: Secure QR coding of images using the techniques of encoding and encryption. Int. J. Appl. Eng. Res. 9(12), 2009–2017 (2014). ISSN 0973-4562

    Google Scholar 

  2. Ajish, S., Rajasree, R.: Secure Mail Using Visual Cryptography (SMVC), 5th ICCCNT, Hefei, China 11–13 July 2014

    Google Scholar 

  3. Benoraira, A., Benma hammed, K., Boucenna, N.: Blind Image Watermarking Technique Based on Differential Embedding in DWT and DCT Domains, Springer (2015)

    Google Scholar 

  4. Aparna, J.R., Ayyappan, S.: Comparison of digital watermarking techniques. In: International Conference for Convergence of Technology, (2014)

    Google Scholar 

  5. Singh, B., Dhaka, V.S., Saharan, R.: Blind Detection Attack Resistant Image Watermarking, IEEE, (2014)

    Google Scholar 

  6. Huang, C.H., Wu, J.L.: Attacking visible watermarking schemes. IEEE Trans. Multimed. 6(1), Feb. (2004)

    Google Scholar 

  7. Bay, H., Ess, A., Tuytelaars, T., Van Gool, L.: Speeded-Up Robust Features (SURF), Elsevier, (2007)

    Google Scholar 

  8. Degadwala, S.D., Gaur, S.: Privacy preserving system using Pseudo Zernike moment with SURF and affine transformation on RST attacks. Int. J. Comput. Sci. Inf. Secur. 15(4), April (2017)

    Google Scholar 

  9. Gupta, A.K., Raval, M.S.: A Robust and Secure Watermarking Scheme Based on Singular Values Replacement Sadhana, vol. 37, Part 4. Indian Academy of Sciences, pp. 425–440 Aug. (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sheshang D. Degadwala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Degadwala, S.D., Gaur, S. (2018). 4-Share VCS Based Image Watermarking for Dual RST Attacks. In: Hemanth, D., Smys, S. (eds) Computational Vision and Bio Inspired Computing . Lecture Notes in Computational Vision and Biomechanics, vol 28. Springer, Cham. https://doi.org/10.1007/978-3-319-71767-8_77

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-71767-8_77

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-71766-1

  • Online ISBN: 978-3-319-71767-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics