An Image Watermarking Scheme using Threshold Based Secret Sharing

被引:0
作者
Latha, S. Bhargavi [1 ]
Reddy, D. Venkata [2 ]
Damodaram, A. [3 ]
机构
[1] GRIET, Dept CSE, Hyderabad, Andhra Pradesh, India
[2] MGIT, Dept ECE, Hyderabad, Andhra Pradesh, India
[3] SV Univ, Dept CSE, Tirupathy, India
来源
2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC) | 2017年
关键词
Secret shares; DWT; SVD; Watermarking; VISUAL CRYPTOGRAPHY;
D O I
10.1109/IACC.2017.122
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper recommends an idea for authenticating the actual ownership by embedding a share of the secret image invisibly into the host or the original image. Frequency domain Techniques such as DWT and SVD are used for embedding shares into the host image. In frequency domain, compared to the original image, the obtained watermarked image is less distorted which in turn creates an environment that makes the embedded share of secret image unavailable for any kind of misuse. The leftover share of secret image is used to prove the actual ownership. The observed end result of this technique is robust against various available image processing attacks.
引用
收藏
页码:619 / 623
页数:5
相关论文
共 13 条
[1]   Visual cryptography for general access structures [J].
Ateniese, G ;
Blundo, C ;
DeSantis, A ;
Stinson, DR .
INFORMATION AND COMPUTATION, 1996, 129 (02) :86-106
[2]   SECRET IMAGE SHARING: A BOOLEAN-OPERATIONS-BASED APPROACH COMBINING BENEFITS OF POLYNOMIAL-BASED AND FAST APPROACHES [J].
Chao, Kun-Yuan ;
Lin, Ja-Chen .
INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2009, 23 (02) :263-285
[3]   Threshold visual secret sharing by random grids [J].
Chen, Tzung-Her ;
Tsao, Kai-Hsiang .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (07) :1197-1208
[4]  
Cox IJ, 2008, MKS MULTIMED INFORM, P1
[5]  
Fang Wen-Pinn, 2006, [Pattern Recognition and Image Analysis (Advances in Mathematical Theory and Applications), Pattern Recognition and Image Analysis. (Advances in Mathematical Theory and Applications)], V16, P632
[6]  
Hou YC, 2000, 2000 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I-III, P992, DOI 10.1109/ICOSP.2000.891692
[7]   Progressive Visual Cryptography with Unexpanded Shares [J].
Hou, Young-Chang ;
Quan, Zen-Yu .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2011, 21 (11) :1760-1764
[8]   Threshold visual secret sharing based on Boolean operations [J].
Kumar, Sachin ;
Sharma, Rajendra K. .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) :653-664
[9]  
Mishra Abhishek, 2016, INT J COMPUTER SCI I, V6
[10]   A blind watermarking algorithm based on fractional Fourier transform and visual cryptography [J].
Rawat, Sanjay ;
Raman, Balasubramanian .
SIGNAL PROCESSING, 2012, 92 (06) :1480-1491