An IPR protection scheme based on wavelet transformation and visual cryptography

被引:3
作者
Hou, Young-Chang [1 ]
Tseng, A-Yu [2 ,3 ]
Quan, Zen-Yu [4 ]
Liu, Hsin-Ju [1 ]
机构
[1] Tamkang Univ, Dept Informat Management, Taipei, Taiwan
[2] Tamkang Univ, Dept Management Sci, Taipei, Taiwan
[3] Natl Open Univ, Ctr Comp, Taipei, Taiwan
[4] Natl Cent Univ, Dept Informat Management, Taoyuan, Taiwan
关键词
Digital watermarking; wavelet transformation; visual cryptography; law of large numbers; copyright protection; WATERMARKING ALGORITHM; IMAGES; SIZE;
D O I
10.3906/elk-1405-180
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As information technology is fast developing, it brings great convenience to our everyday life. However, hackers may also access confidential data illegally and easily from computers over the Internet. Therefore, how to protect property rights against infringement is an essential issue. Digital watermarking is a method that adds personal information to an intellectual property to protect one's ownership rights. Should the intellectual property be disputed, the owner can retrieve the watermark and prove ownership rights. Based on the principles of visual cryptography and the law of large numbers, our study generates shares by comparing pseudorandomly selected value pairs during the processes of embedding and verifying the hidden watermark. The wavelet transformation coefficients of the LL3 region are used as the sample population. Experimental results indicate that our method has good robustness against darkening, lightening, blurring, sharpening, noising, distortion, jitter, JPEG, and cropping attacks. There are 3 advantages to our method: 1) robustness is retained when the protected image suffers from attacks; 2) unexpanded shares are created to reduce the size of every share; 3) the embedded watermark is decoded by the human visual system during the verification process.
引用
收藏
页码:4063 / 4082
页数:20
相关论文
共 34 条
[1]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[2]   Improved wavelet-based watermarking through pixel-wise masking [J].
Barni, M ;
Bartolini, F ;
Piva, A .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (05) :783-791
[3]  
Benyoussef Meryem, 2014, Journal of Theoretical and Applied Information Technology, V60, P372
[4]   A colour image copyright protection scheme based on visual cryptography and discrete cosine transform [J].
Chang, CC ;
Hsiao, JY ;
Yeh, JC .
IMAGING SCIENCE JOURNAL, 2002, 50 (03) :133-140
[5]   A review of watermarking and the importance of perceptual modeling [J].
Cox, IJ ;
Miller, ML .
HUMAN VISION AND ELECTRONIC IMAGING II, 1997, 3016 :92-99
[6]   Protecting patient privacy from unauthorized release of medical images using a bio-inspired wavelet-based watermarking approach [J].
Fakhari, Pegah ;
Vahedi, Ehsan ;
Lucas, Caro .
DIGITAL SIGNAL PROCESSING, 2011, 21 (03) :433-446
[7]   Detecting LSB steganography in color and gray-scale images [J].
Fridrich, J. ;
Goljan, M. ;
Du, R. .
IEEE Multimedia, 2001, 8 (04) :22-28
[8]  
Hogg R.V., 2009, Probability and statistical inference
[9]   Visual cryptography for color images [J].
Hou, YC .
PATTERN RECOGNITION, 2003, 36 (07) :1619-1629
[10]  
Hou YC, 2002, 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS, P104