An RST-Resilient Image Copyright Protection Scheme Based on the Invariant Domain and Image Secret Sharing

被引:0
|
作者
Hsieh, Shang-Lin [1 ]
Chen, Ding-Jie [1 ]
Huang, Bin-Yuan [1 ]
Tsai, I-Ju [1 ]
机构
[1] Tatung Univ, Taipei 104, Taiwan
来源
2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), VOLS 1-6 | 2008年
关键词
secret sharing; RST-invariants domain; Fourier transform; log-polar mapping; power law transform;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a novel scheme that can protect the copyrights of images based on the RST-invariant domain and Image Secret Sharing (ISS) scheme. The proposed scheme aims at resisting the rotation, scaling, and translation (RST) of the geometric distortions. The scheme first extracts the features from the RST-invariant domain of the host image. It then utilizes the ISS scheme to encode a binary logo according to the extracted features. Finally, it generates an image for authentication, which can later be used to reconstruct the logo for copyright verification when disputes over the image ownership occur. The experimental results show that the proposed scheme can achieve a satisfactory accuracy rate for images suffering RST distortions.
引用
收藏
页码:1058 / 1063
页数:6
相关论文
共 50 条
  • [31] An Image Secret Sharing Technique with Block Based Image Coding
    Das, Sujit Kumar
    Dhara, Bibhas Chandra
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 648 - 652
  • [32] Authentication and copyright protection watermarking scheme for H.264 based on visual saliency and secret sharing
    Tian, Lihua
    Zheng, Nanning
    Xue, Jianru
    Li, Ce
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (09) : 2991 - 3011
  • [33] Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE Problem
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    Farahi, Seyed Taghi
    Noorallahzadeh, Mohammad Hossein
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 137 (02) : 1099 - 1118
  • [34] Authentication and copyright protection watermarking scheme for H.264 based on visual saliency and secret sharing
    Lihua Tian
    Nanning Zheng
    Jianru Xue
    Ce Li
    Multimedia Tools and Applications, 2015, 74 : 2991 - 3011
  • [35] A new (t, n) threshold image hiding scheme for sharing a secret color image
    Chang, CC
    Lin, IC
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 196 - 202
  • [36] Single secret image sharing scheme using neural cryptography
    Mayank Gupta
    Manu Gupta
    Maroti Deshmukh
    Multimedia Tools and Applications, 2020, 79 : 12183 - 12204
  • [37] An efficient (t,n)–threshold secret image sharing scheme
    Ali Kanso
    Mohammad Ghebleh
    Multimedia Tools and Applications, 2017, 76 : 16369 - 16388
  • [38] A Linear Algebraic Threshold Essential Secret Image Sharing Scheme
    Ghebleh, Mohammad
    Kanso, Ali
    Alazemi, Abdullah
    MATHEMATICS, 2022, 10 (05)
  • [39] A novel secret image sharing scheme using large primes
    Mohammad Ghebleh
    Ali Kanso
    Multimedia Tools and Applications, 2018, 77 : 11903 - 11923
  • [40] Single secret image sharing scheme using neural cryptography
    Gupta, Mayank
    Gupta, Manu
    Deshmukh, Maroti
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (17-18) : 12183 - 12204