Copyright protection based on visual cryptography

被引:0
作者
Hou, YC [1 ]
机构
[1] Natl Cent Univ, Dept Informat Management, Chungli 32054, Taiwan
来源
6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: IMAGE, ACOUSTIC, SPEECH AND SIGNAL PROCESSING II | 2002年
关键词
watermarking; visual cryptography; intellectual property protection;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Digital watermark is a technique used to protect one's intellectual property. In this paper, we utilize the characteristics of the visual cryptography, which can't be forged and needn't complex computation to embed our watermark. We treat the most significant bit plane of the original image as the share1. Using the watermark and sharel, we can generate the sharel In this way, we can embed the watermark information into the original image abstractly without modifying the original image. When verifying whether an image belongs to someone's intellectual property, we only need to superimpose the most significant bit plane extracted from the image over the share2 owned by the authors to retrieve the watermark. Because the most significant bit plane can obtain the most robustness after some image processing, the watermark can be extracted without the assistance of the original image. We believe our study can provide an easy and reliable way for the protection of the digital image information.
引用
收藏
页码:104 / 109
页数:6
相关论文
共 50 条
  • [31] A watermark technology based on visual cryptography
    Sleit, Azzam Taial
    Abusitta, Adel
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VII, PROCEEDINGS, 2006, : 502 - +
  • [32] A Watermarking Technique based on Visual Cryptography
    Surekha, B.
    Swamy, G. N.
    Rao, K. Srinivasa
    Kumar, A. Ravi
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 470 - 473
  • [33] A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography and block G-H feature
    Shi, Hui
    Li, Yanni
    Hu, Baoyue
    Chen, Meihan
    Ren, Yonggong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (26) : 38019 - 38051
  • [34] A Novel Visual Cryptography Scheme
    Jena, Debasish
    Jena, Sanjay Kumar
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 207 - 211
  • [35] Optical hiding with visual cryptography
    Shi, Yishi
    Yang, Xiubo
    JOURNAL OF OPTICS, 2017, 19 (11)
  • [36] A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography and block G-H feature
    Hui Shi
    Yanni Li
    Baoyue Hu
    Meihan Chen
    Yonggong Ren
    Multimedia Tools and Applications, 2022, 81 : 38019 - 38051
  • [37] Visual Cryptography for Image Privacy protection using Diverse Image media
    Rao, Jyoti
    Patil, Vikram
    2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 855 - 859
  • [38] Biometric template protection using cancelable biometrics and visual cryptography techniques
    Kaur, Harkeerat
    Khanna, Pritee
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (23) : 16333 - 16361
  • [39] Biometric template protection using cancelable biometrics and visual cryptography techniques
    Harkeerat Kaur
    Pritee Khanna
    Multimedia Tools and Applications, 2016, 75 : 16333 - 16361
  • [40] A video copyright protection system based on contentID
    Zhao, J
    Hayasaka, R
    Muranoi, R
    Ito, M
    Matsushita, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (12) : 2131 - 2141