Abstract
The combination of watermarking schemes with visual cryptography has been recently used for the copyright protection of digital images. The derived schemes try to satisfy the increasing need for the security of multimedia data, caused in turn by the enormous amount of digital information that is daily created and distributed over different kinds of communication channels. Watermarking is generally used to insert “secret” information into an original image, with different purposes and different features, usually as a means to assess the ownership of the modified image. Visual cryptography refers to a way to decompose a secret image into shares and distribute them to a number of participants, so that only legitimate subsets of participants can reconstruct the original image by combining their shares.
The combination of both techniques can provide some important solutions for tampering verification and the resolution of disputes on the ownership of a given image, as provided by several proposals appeared in literature. In this work we present a general model for the watermarking schemes obtained from the combination with visual cryptography Furthermore we discuss also the improved robustness such schemes can achieve, trying to analyze the effects that random or induced errors can have on the reconstructed watermark. Finally, some possible extensions of the combined approach are also introduced considering different visual cryptographic schemes and their possible applications in new scenarios.
A preliminary version of this paper appeared under the title ”Visual Cryptography based Watermarking: Definition and Meaning” in Proc. of11th International Workshop on Digital-forensics and Watermarking (IWDW 2012), Shanghai, China, 2012 [6]
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Unzign watermark removal software, http://www.altern.org/watermark/
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation 129(2), 86–106 (1996)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer, F., Monien, B. (eds.) ICALP 1996. LNCS, vol. 1099, pp. 416–428. Springer, Heidelberg (1996)
Chen, T.-H., Chang, C.-C., Wu, C.-S., Lou, D.-C.: On the security of a copyright protection scheme based on visual cryptography. Computer Standards & Interfaces 31(1), 1–5 (2009)
Cimato, S., Yang, C.N.: Visual Cryptography and Secret Image Sharing. Digital Imaging and Computer Vision Series. Taylor & Francis (2011)
Cimato, S., Yang, J.C.-N., Wu, C.-C.: Visual cryptography based watermarking: definition and meaning. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 435–448. Springer, Heidelberg (2013)
Craver, S., Yeo, B.-L., Yeung, M.: Technical trials and legal tribulations. Commun. ACM 41, 45–54 (1998)
Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proceedings of the IEEE 87(7), 1079–1107 (1999)
Hassan, M.A., Khalili, M.A.: Self watermarking based on visual cryptography. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 8, pp. 159–162 (2005)
Hou, Y.-C., Chen, P.-M.: An asymmetric watermarking scheme based on visual cryptography. In: 5th International Conference on Signal Processing Proceedings, WCCC-ICSP 2000, vol. 2, pp. 992–995 (2000)
Hsu, C.-S., Hou, Y.-C.: A visual cryptography and statistics based method for ownership identification of digital images. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 2, pp. 172–175 (2005)
Hwang, R.: A digital image copyright protection scheme based on visual cryptography. Tambang Journal of Science and Engineering 3(2), 97–106 (2000)
Li, Q., Sencar, H.T., Memon, N.D.: Security issues in watermarking applications. In: ACM Workshop on Multimedia Content Protection and Security (2006)
Lou, D.-C., Tso, H.-K., Liu, J.-L.: A copyright protection scheme for digital images using visual cryptography technique. Computer Standards & Interfaces 29(1), 125–131 (2007)
Luo, H., Lu, Z.-M., Pan, J.-S.: Multiple watermarking in visual cryptography. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol. 5041, pp. 60–70. Springer, Heidelberg (2008)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet, S., Pun, T.: Second generation benchmarking and application oriented evaluation. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 340–353. Springer, Heidelberg (2001)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998)
Sencar, H.T., Memon, N.D.: Watermarking and ownership problem: a revisit. In: Digital Rights Management Workshop, pp. 93–101 (2005)
Singh, R., Gupta, R.: Digital watermarking with visual cryptography in spatial domain. In: International Conference on Advanced Computing, Communication and Networks 2011, pp. 948–951 (2011)
Surekha, B., Swamy, G.N.: A spatial domain public image watermarking. International Journal of Security and its Applications 5(1), 1–12 (2011)
Tai, G.-C., Chang, L.-W.: Visual cryptography for digital watermarking in still images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3332, pp. 50–57. Springer, Heidelberg (2004)
Wang, F.-H., Pan, J.-S., Jain, L.C.: Watermarking with visual cryptography and gain-shape vq. In: Wang, F.-H., Pan, J.-S., Jain, L.C. (eds.) Innovations in Digital Watermarking Techniques. SCI, vol. 232, pp. 163–172. Springer, Heidelberg (2009)
Wang, F.-H., Pan, J.-S., Jain, L.C.: Innovations in Digital Watermarking Techniques. SCI, vol. 232. Springer, Heidelberg (2009)
Wang, F.-H., Yen, K.K., Jain, L.C., Pan, J.-S.: Multiuser-based shadow watermark extraction system. Information Sciences 177(12), 2522–2532 (2007)
Wang, M.-S., Chen, W.-C.: Digital image copyright protection scheme based on visual cryptography and singular value decomposition. Pattern Recognition 46(6), 1530–1541 (2007)
Yuan, Z., Xia, G., Wen, Q., Yang, Y.: Multi-watermarking scheme for group users based on visual cryptography. Journal of Electronics (China) 22, 364–370 (2005) 10.1007/BF02687923
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Cimato, S., Yang, J.C.N., Wu, CC. (2014). Visual Cryptography Based Watermarking. In: Shi, Y.Q., Liu, F., Yan, W. (eds) Transactions on Data Hiding and Multimedia Security IX. Lecture Notes in Computer Science, vol 8363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55046-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-55046-1_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55045-4
Online ISBN: 978-3-642-55046-1
eBook Packages: Computer ScienceComputer Science (R0)