An RST-Resilient Image Copyright Protection Scheme Based on the Invariant Domain and Image Secret Sharing

被引:0
|
作者
Hsieh, Shang-Lin [1 ]
Chen, Ding-Jie [1 ]
Huang, Bin-Yuan [1 ]
Tsai, I-Ju [1 ]
机构
[1] Tatung Univ, Taipei 104, Taiwan
来源
2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), VOLS 1-6 | 2008年
关键词
secret sharing; RST-invariants domain; Fourier transform; log-polar mapping; power law transform;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a novel scheme that can protect the copyrights of images based on the RST-invariant domain and Image Secret Sharing (ISS) scheme. The proposed scheme aims at resisting the rotation, scaling, and translation (RST) of the geometric distortions. The scheme first extracts the features from the RST-invariant domain of the host image. It then utilizes the ISS scheme to encode a binary logo according to the extracted features. Finally, it generates an image for authentication, which can later be used to reconstruct the logo for copyright verification when disputes over the image ownership occur. The experimental results show that the proposed scheme can achieve a satisfactory accuracy rate for images suffering RST distortions.
引用
收藏
页码:1058 / 1063
页数:6
相关论文
共 50 条
  • [21] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Guttikonda Prashanti
    Mundukur Nirupama Bhat
    Multimedia Tools and Applications, 2024, 83 : 403 - 423
  • [22] A (n, n) Secret Image Sharing Scheme Based On Array Scrambling
    Bhattacharjee, Tapasi
    Singh, Jyoti Prakash
    Bhattacharya, Samar
    2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2012, : 287 - 290
  • [23] A Lossless Linear Algebraic Secret Image Sharing Scheme
    Kanso, Ali
    Ghebleh, Mohammad
    Alazemi, Abdullah
    INFORMATICA, 2020, 31 (03) : 499 - 522
  • [24] A grouped-scalable secret image sharing scheme
    Liu, Wenjie
    Wang, Anhong
    Chang, Chin-Chen
    Li, Zhihong
    Liu, Li
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (17) : 7095 - 7109
  • [25] Secret image sharing scheme with adaptive authentication strength
    Ulutas, Guzin
    Ulutas, Mustafa
    Nabiyev, Vasif V.
    PATTERN RECOGNITION LETTERS, 2013, 34 (03) : 283 - 291
  • [26] A Novel Hierarchical Threshold Secret Image Sharing Scheme
    Qin, Shiyue
    Tan, Zhenhua
    Li, Hong
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 1163 - 1167
  • [27] A new image secret sharing scheme to identify cheaters
    Zhao, Rong
    Zhao, Jian-jie
    Dai, Fang
    Zhao, Feng-qun
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 252 - 257
  • [28] A grouped-scalable secret image sharing scheme
    Wenjie Liu
    Anhong Wang
    Chin-Chen Chang
    Zhihong Li
    Li Liu
    Multimedia Tools and Applications, 2015, 74 : 7095 - 7109
  • [29] A reliable (k, n) image secret sharing scheme
    Bai, Li
    DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 31 - 36
  • [30] A Copyright Protection Scheme for Color Images using Secret Sharing and Wavelet Transform
    Hsieh, Shang-Lin
    Hsu, Lung-Yao
    Tsai, I-Ju
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10, 2005, 10 : 17 - 23