A new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover images

被引:18
作者
Amiri, Tayebe [1 ]
Moghaddam, Mohsen Ebrahimi [1 ]
机构
[1] Shahid Beheshti Univ, Fac Comp Sci & Engn, Tehran, Iran
关键词
Visual cryptography; Multiple cover image; SIFT; SVD; COPYRIGHT PROTECTION SCHEME;
D O I
10.1007/s11042-015-2770-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new Visual Cryptography based watermarking scheme for multiple cover images is proposed. The proposed scheme conceals watermark without altering the original cover images. First, it extracts the feature shares by applying the discrete wavelet transform (DWT), Singular value decomposition (SVD), and scale invariant feature transform (SIFT) on the cover images. The extracted feature shares are then used together with the private key and watermark to construct a secret share. The secret share should be registered with a trust authority. When a dispute over cover images happens, watermark can be extracted by using private key, feature shares, and secret share. The experimental results showed the method robustness versus various attacks, especially rotation and scaling.
引用
收藏
页码:8527 / 8543
页数:17
相关论文
共 26 条
[1]   An image intellectual property protection scheme for gray-level images using visual secret sharing strategy [J].
Chang, CC ;
Chuang, JC .
PATTERN RECOGNITION LETTERS, 2002, 23 (08) :931-941
[2]   SVD-based digital image watermarking scheme [J].
Chang, CC ;
Tsai, P ;
Lin, CC .
PATTERN RECOGNITION LETTERS, 2005, 26 (10) :1577-1586
[3]   On the security of a copyright protection scheme based on visual cryptography [J].
Chen, Tzung-Her ;
Chang, Chin-Chen ;
Wu, Chang-Sian ;
Lou, Der-Chyuan .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) :1-5
[4]  
Hsieh S. L., 2004, P INT COMP S, P661
[5]   Copyright protection scheme for digital images using visual cryptography and sampling methods [J].
Hsu, CS ;
Hou, YC .
OPTICAL ENGINEERING, 2005, 44 (07) :1-10
[6]   A hybrid SVD-DCT watermarking method based on LPSNR [J].
Huang, FJ ;
Guan, ZH .
PATTERN RECOGNITION LETTERS, 2004, 25 (15) :1769-1775
[7]   THE SINGULAR VALUE DECOMPOSITION - ITS COMPUTATION AND SOME APPLICATIONS [J].
KLEMA, VC ;
LAUB, AJ .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1980, 25 (02) :164-176
[8]  
Lee JS, 2014, COMPUTER SCI INFORM, P225
[9]   An efficient watermarking method based on significant difference of wavelet coefficient quantization [J].
Lin, Wei-Hung ;
Horng, Shi-Jinn ;
Kao, Tzong-Wann ;
Fan, Pingzhi ;
Lee, Cheng-Ling ;
Pan, Yi .
IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (05) :746-757
[10]   Image copyright protection with forward error correction [J].
Lin, Wei-Hung ;
Horng, Shi-Jinn ;
Kao, Tzong-Wann ;
Chen, Rong-Jian ;
Chen, Yuan-Hsin ;
Lee, Cheng-Ling ;
Terano, Takao .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (09) :11888-11894