Copyright protection based on visual cryptography

被引:0
作者
Hou, YC [1 ]
机构
[1] Natl Cent Univ, Dept Informat Management, Chungli 32054, Taiwan
来源
6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: IMAGE, ACOUSTIC, SPEECH AND SIGNAL PROCESSING II | 2002年
关键词
watermarking; visual cryptography; intellectual property protection;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Digital watermark is a technique used to protect one's intellectual property. In this paper, we utilize the characteristics of the visual cryptography, which can't be forged and needn't complex computation to embed our watermark. We treat the most significant bit plane of the original image as the share1. Using the watermark and sharel, we can generate the sharel In this way, we can embed the watermark information into the original image abstractly without modifying the original image. When verifying whether an image belongs to someone's intellectual property, we only need to superimpose the most significant bit plane extracted from the image over the share2 owned by the authors to retrieve the watermark. Because the most significant bit plane can obtain the most robustness after some image processing, the watermark can be extracted without the assistance of the original image. We believe our study can provide an easy and reliable way for the protection of the digital image information.
引用
收藏
页码:104 / 109
页数:6
相关论文
共 50 条
  • [41] A NOVEL WATERMARKING SCHEME FOR COPYRIGHT PROTECTION BASED ON ADAPTIVE JOINT IMAGE FEATURE AND VISUAL SECRET SHARING
    Fan, Li
    Gao, Tiegang
    Yang, Qunting
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (7A): : 3679 - 3694
  • [42] A TTP watermarking protocol based on visual cryptography
    Baiyan Wu
    Yuwei Peng
    Chao Wang
    Multimedia Tools and Applications, 2022, 81 : 41079 - 41101
  • [43] A TTP watermarking protocol based on visual cryptography
    Wu, Baiyan
    Peng, Yuwei
    Wang, Chao
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (28) : 41079 - 41101
  • [44] A blind watermarking algorithm based on fractional Fourier transform and visual cryptography
    Rawat, Sanjay
    Raman, Balasubramanian
    SIGNAL PROCESSING, 2012, 92 (06) : 1480 - 1491
  • [45] Dynamic visual cryptography based on chaotic oscillations
    Petrauskiene, Vilma
    Palivonaite, Rita
    Aleksa, Algiment
    Ragulskis, Minvydas
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (01) : 112 - 120
  • [46] VISUAL CRYPTOGRAPHY
    Ashutosh, R.
    Sen, Sayan Dev
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 805 - +
  • [47] A new two-level information protection scheme based on visual cryptography and QR code with multiple decryptions
    Fu, Zhengxin
    Cheng, Yuqiao
    Liu, Sijia
    Yu, Bin
    MEASUREMENT, 2019, 141 : 267 - 276
  • [48] Generalized random grids-based threshold visual cryptography with meaningful shares
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    Yang, Ching-Nung
    SIGNAL PROCESSING, 2015, 109 : 317 - 333
  • [49] Watermarking-based copyright protection of sequential functions
    Torunoglu, I
    Charbon, E
    IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2000, 35 (03) : 434 - 440
  • [50] Metadata-based image watermarking for copyright protection
    Huang, Hsiang-Cheh
    Fang, Wai-Chi
    SIMULATION MODELLING PRACTICE AND THEORY, 2010, 18 (04) : 436 - 445