Skip to main content

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 8363))

Abstract

The combination of watermarking schemes with visual cryptography has been recently used for the copyright protection of digital images. The derived schemes try to satisfy the increasing need for the security of multimedia data, caused in turn by the enormous amount of digital information that is daily created and distributed over different kinds of communication channels. Watermarking is generally used to insert “secret” information into an original image, with different purposes and different features, usually as a means to assess the ownership of the modified image. Visual cryptography refers to a way to decompose a secret image into shares and distribute them to a number of participants, so that only legitimate subsets of participants can reconstruct the original image by combining their shares.

The combination of both techniques can provide some important solutions for tampering verification and the resolution of disputes on the ownership of a given image, as provided by several proposals appeared in literature. In this work we present a general model for the watermarking schemes obtained from the combination with visual cryptography Furthermore we discuss also the improved robustness such schemes can achieve, trying to analyze the effects that random or induced errors can have on the reconstructed watermark. Finally, some possible extensions of the combined approach are also introduced considering different visual cryptographic schemes and their possible applications in new scenarios.

A preliminary version of this paper appeared under the title ”Visual Cryptography based Watermarking: Definition and Meaning” in Proc. of11th International Workshop on Digital-forensics and Watermarking (IWDW 2012), Shanghai, China, 2012 [6]

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Unzign watermark removal software, http://www.altern.org/watermark/

  2. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation 129(2), 86–106 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  3. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer, F., Monien, B. (eds.) ICALP 1996. LNCS, vol. 1099, pp. 416–428. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  4. Chen, T.-H., Chang, C.-C., Wu, C.-S., Lou, D.-C.: On the security of a copyright protection scheme based on visual cryptography. Computer Standards & Interfaces 31(1), 1–5 (2009)

    Article  Google Scholar 

  5. Cimato, S., Yang, C.N.: Visual Cryptography and Secret Image Sharing. Digital Imaging and Computer Vision Series. Taylor & Francis (2011)

    Google Scholar 

  6. Cimato, S., Yang, J.C.-N., Wu, C.-C.: Visual cryptography based watermarking: definition and meaning. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 435–448. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  7. Craver, S., Yeo, B.-L., Yeung, M.: Technical trials and legal tribulations. Commun. ACM 41, 45–54 (1998)

    Article  Google Scholar 

  8. Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proceedings of the IEEE 87(7), 1079–1107 (1999)

    Article  Google Scholar 

  9. Hassan, M.A., Khalili, M.A.: Self watermarking based on visual cryptography. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 8, pp. 159–162 (2005)

    Google Scholar 

  10. Hou, Y.-C., Chen, P.-M.: An asymmetric watermarking scheme based on visual cryptography. In: 5th International Conference on Signal Processing Proceedings, WCCC-ICSP 2000, vol. 2, pp. 992–995 (2000)

    Google Scholar 

  11. Hsu, C.-S., Hou, Y.-C.: A visual cryptography and statistics based method for ownership identification of digital images. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 2, pp. 172–175 (2005)

    Google Scholar 

  12. Hwang, R.: A digital image copyright protection scheme based on visual cryptography. Tambang Journal of Science and Engineering 3(2), 97–106 (2000)

    Google Scholar 

  13. Li, Q., Sencar, H.T., Memon, N.D.: Security issues in watermarking applications. In: ACM Workshop on Multimedia Content Protection and Security (2006)

    Google Scholar 

  14. Lou, D.-C., Tso, H.-K., Liu, J.-L.: A copyright protection scheme for digital images using visual cryptography technique. Computer Standards & Interfaces 29(1), 125–131 (2007)

    Article  Google Scholar 

  15. Luo, H., Lu, Z.-M., Pan, J.-S.: Multiple watermarking in visual cryptography. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol. 5041, pp. 60–70. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  16. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  17. Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet, S., Pun, T.: Second generation benchmarking and application oriented evaluation. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 340–353. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  18. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  19. Sencar, H.T., Memon, N.D.: Watermarking and ownership problem: a revisit. In: Digital Rights Management Workshop, pp. 93–101 (2005)

    Google Scholar 

  20. Singh, R., Gupta, R.: Digital watermarking with visual cryptography in spatial domain. In: International Conference on Advanced Computing, Communication and Networks 2011, pp. 948–951 (2011)

    Google Scholar 

  21. Surekha, B., Swamy, G.N.: A spatial domain public image watermarking. International Journal of Security and its Applications 5(1), 1–12 (2011)

    Google Scholar 

  22. Tai, G.-C., Chang, L.-W.: Visual cryptography for digital watermarking in still images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3332, pp. 50–57. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  23. Wang, F.-H., Pan, J.-S., Jain, L.C.: Watermarking with visual cryptography and gain-shape vq. In: Wang, F.-H., Pan, J.-S., Jain, L.C. (eds.) Innovations in Digital Watermarking Techniques. SCI, vol. 232, pp. 163–172. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  24. Wang, F.-H., Pan, J.-S., Jain, L.C.: Innovations in Digital Watermarking Techniques. SCI, vol. 232. Springer, Heidelberg (2009)

    Book  Google Scholar 

  25. Wang, F.-H., Yen, K.K., Jain, L.C., Pan, J.-S.: Multiuser-based shadow watermark extraction system. Information Sciences 177(12), 2522–2532 (2007)

    Article  Google Scholar 

  26. Wang, M.-S., Chen, W.-C.: Digital image copyright protection scheme based on visual cryptography and singular value decomposition. Pattern Recognition 46(6), 1530–1541 (2007)

    Google Scholar 

  27. Yuan, Z., Xia, G., Wen, Q., Yang, Y.: Multi-watermarking scheme for group users based on visual cryptography. Journal of Electronics (China) 22, 364–370 (2005) 10.1007/BF02687923

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Cimato, S., Yang, J.C.N., Wu, CC. (2014). Visual Cryptography Based Watermarking. In: Shi, Y.Q., Liu, F., Yan, W. (eds) Transactions on Data Hiding and Multimedia Security IX. Lecture Notes in Computer Science, vol 8363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55046-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-55046-1_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-55045-4

  • Online ISBN: 978-3-642-55046-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics