A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography and block G-H feature

被引:0
作者
Hui Shi
Yanni Li
Baoyue Hu
Meihan Chen
Yonggong Ren
机构
[1] Liaoning Normal University,Computer and Information Technology College
来源
Multimedia Tools and Applications | 2022年 / 81卷
关键词
Zero-watermarking; Visual cryptography; LT code; G-H feature extraction; Robustness; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Zero-watermarking is a distortion-free technique for copyright protection and has become a research hotspot in the field of digital watermarking. In the face of weak robustness and security of existing schemes, this paper proposes a robust and security zero-watermarking scheme for copyright protection using a combination of Visual Cryptography, LT Code, CRC, Block G-H feature, Arnold and timestamp authority. Firstly, the original image is applied with Visual Cryptography to generate two Visual Cryptography Shares. Then, extract the content feature from all blocks of the combined image by the improved G-H feature extraction scheme. To resist strong attacks, transition matrix is generated according to the relationship between the group feature mean and the overall feature mean. Next, the original watermarking image is encrypted by LT code and CRC. Finally, zero-watermarks are generated according to the transition matrix and encrypted watermarking. To promote security, Logistic mapping, Arnold and Visual cryptography are adopted. Experimental results demonstrate that the proposed scheme has adequate equalization and visibility as well as strong robustness against various attacks, such as Gaussian noise, Salt and pepper noise, media filtering, JPEG compressing, shearing, rotation and line offsetting. In addition to experimental results, robust theoretical analysis, security theoretical analysis and complexity analysis are presented to demonstrate the comprehensive performance.
引用
收藏
页码:38019 / 38051
页数:32
相关论文
共 122 条
  • [1] Anushiadevi R(2021)Uncover the cover to recover the hidden secret - a separable reversible data hiding framework[J] Multimed Tools Appl 80 1-20
  • [2] Praveenkumar P(2014)On (k, n) Designs Codes & Cryptography 71 153-162
  • [3] Rayappan J(1996)-visual cryptography scheme[J] Quantum Information & Computation 129 86-106
  • [4] Arumugam S(2001)Visual cryptography for general access structures[J] Designs Codes and Cryptography 24 255-278
  • [5] Lakshmanan R(2006)Improved scheme for visual cryptography[J] Science 369 169-182
  • [6] Nagar AK(2010)Visual cryptography scheme with optimal pixel expansion[J]. Theoretical computer Design codes and cryptography 55 19-35
  • [7] Ateniese G(2021)Optimal (k, n) visual cryptography schemes for general k[J] Multimed Tools Appl 80 1-17
  • [8] Blundo C(2002)A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images[J] Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition 2 886-893
  • [9] Santis AD(2020)Histograms of oriented gradients for human detection[C] Multimed Tools Appl 80 1-12
  • [10] Blundo C(2021)A robust video zero-watermarking based on deep convolutional neural network and self-organizing map in polar complex exponential transform domain[J] Computers & Electrical Engineering 89 106993-331