Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners

被引:27
作者
Liu, F. [1 ]
Wu, C. -K. [1 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100190, Peoples R China
关键词
PROTECTION SCHEME;
D O I
10.1049/iet-ifs.2009.0183
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Watermarking is a technique to protect the copyright of digital media such as image, text, music and movie. In this study, a robust watermarking scheme for multiple cover images and multiple owners is proposed. The proposed scheme makes use of the visual cryptography (VC) technique, transform domain technique, chaos technique, noise reduction technique and error correcting code technique where the VC technique provides the capability to protect the copyright of multiple cover images for multiple owners, and the rest of the techniques are applied to enhance the robustness of the scheme.
引用
收藏
页码:121 / 128
页数:8
相关论文
共 19 条
[1]   An image intellectual property protection scheme for gray-level images using visual secret sharing strategy [J].
Chang, CC ;
Chuang, JC .
PATTERN RECOGNITION LETTERS, 2002, 23 (08) :931-941
[2]   Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol [J].
Chen, Tzung-Her ;
Tsai, Du-Shiau .
PATTERN RECOGNITION, 2006, 39 (08) :1530-1541
[3]   OPTIMUM (N,2) CODES FOR SMALL VALUES OF CHANNEL ERROR PROBABILITY [J].
CORDARO, JT ;
WAGNER, TJ .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1967, 13 (02) :349-+
[4]  
Hou YC, 2000, 2000 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I-III, P992, DOI 10.1109/ICOSP.2000.891692
[5]  
Hsieh S. L., 2004, P INT COMP S, P661
[6]  
HSIEH SL, 2005, P WORLD AC SCI ENG T, V10, P1307
[7]   Copyright protection scheme for digital images using visual cryptography and sampling methods [J].
Hsu, CS ;
Hou, YC .
OPTICAL ENGINEERING, 2005, 44 (07) :1-10
[8]   Hidden digital watermarks in images [J].
Hsu, CT ;
Wu, JL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) :58-68
[9]   Rotation, scale, and translation resilient watermarking for images [J].
Lin, CY ;
Wu, M ;
Bloom, JA ;
Cox, IJ ;
Miller, ML ;
Lui, YM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (05) :767-782
[10]   Some Extensions on Threshold Visual Cryptography Schemes [J].
Liu, Feng ;
Wu, ChuanKun ;
Lin, XiJun .
COMPUTER JOURNAL, 2010, 53 (01) :107-119