A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography and block G-H feature

被引:5
作者
Shi, Hui [1 ]
Li, Yanni [1 ]
Hu, Baoyue [1 ]
Chen, Meihan [1 ]
Ren, Yonggong [1 ]
机构
[1] Liaoning Normal Univ, Comp & Informat Technol Coll, Dalian 116029, Peoples R China
关键词
Zero-watermarking; Visual cryptography; LT code; G-H feature extraction; Robustness; Security; DIGITAL RIGHTS MANAGEMENT; TRANSFORM;
D O I
10.1007/s11042-022-13136-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Zero-watermarking is a distortion-free technique for copyright protection and has become a research hotspot in the field of digital watermarking. In the face of weak robustness and security of existing schemes, this paper proposes a robust and security zero-watermarking scheme for copyright protection using a combination of Visual Cryptography, LT Code, CRC, Block G-H feature, Arnold and timestamp authority. Firstly, the original image is applied with Visual Cryptography to generate two Visual Cryptography Shares. Then, extract the content feature from all blocks of the combined image by the improved G-H feature extraction scheme. To resist strong attacks, transition matrix is generated according to the relationship between the group feature mean and the overall feature mean. Next, the original watermarking image is encrypted by LT code and CRC. Finally, zero-watermarks are generated according to the transition matrix and encrypted watermarking. To promote security, Logistic mapping, Arnold and Visual cryptography are adopted. Experimental results demonstrate that the proposed scheme has adequate equalization and visibility as well as strong robustness against various attacks, such as Gaussian noise, Salt and pepper noise, media filtering, JPEG compressing, shearing, rotation and line offsetting. In addition to experimental results, robust theoretical analysis, security theoretical analysis and complexity analysis are presented to demonstrate the comprehensive performance.
引用
收藏
页码:38019 / 38051
页数:33
相关论文
共 43 条
  • [1] [Anonymous], 2016, KODAK LOSSLESS TRUE
  • [2] [Anonymous], 2016, UCID UNCOMPRESSED CO
  • [3] [Anonymous], 2016, USC SIPI IMAGE DATAB
  • [4] Uncover the cover to recover the hidden secret-A separable reversible data hiding framework
    Anushiadevi, R.
    Praveenkumar, Padmapriya
    Rayappan, John Bosco Balaguru
    Amirtharajan, Rengarajan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (13) : 19695 - 19714
  • [5] On (k, n)*-visual cryptography scheme
    Arumugam, S.
    Lakshmanan, R.
    Nagar, Atulya K.
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (01) : 153 - 162
  • [6] Visual cryptography for general access structures
    Ateniese, G
    Blundo, C
    DeSantis, A
    Stinson, DR
    [J]. INFORMATION AND COMPUTATION, 1996, 129 (02) : 86 - 106
  • [7] Improved schemes for visual cryptography
    Blundo, C
    Bonis, AD
    Santis, AD
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2001, 24 (03) : 255 - 278
  • [8] Visual cryptography schemes with optimal pixel expansion
    Blundo, Carlo
    Cimato, Stelvio
    De Santis, Alfredo
    [J]. THEORETICAL COMPUTER SCIENCE, 2006, 369 (1-3) : 169 - 182
  • [9] Optimal (k, n) visual cryptographic schemes for general k
    Bose, Mausumi
    Mukerjee, Rahul
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2010, 55 (01) : 19 - 35
  • [10] A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images
    Chidambaram, Nithya
    Raj, Pethuru
    Thenmozhi, K.
    Amirtharajan, Rengarajan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (15) : 23359 - 23375