Self Watermarking based on Visual Cryptography
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32795
Self Watermarking based on Visual Cryptography

Authors: Mahmoud A. Hassan, Mohammed A. Khalili

Abstract:

We are proposing a simple watermarking method based on visual cryptography. The method is based on selection of specific pixels from the original image instead of random selection of pixels as per Hwang [1] paper. Verification information is generated which will be used to verify the ownership of the image without the need to embed the watermark pattern into the original digital data. Experimental results show the proposed method can recover the watermark pattern from the marked data even if some changes are made to the original digital data.

Keywords: Watermarking, visual cryptography, visualthreshold.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1080304

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1692

References:


[1] R. Hwang, A digital Image Copyright Protection Scheme Based on Visual Cryptography, Tambang Journal of science and Engineering, vol.3, No.2, pp. 97-106 (2000).
[2] N.Naor and A. Shamir, Visual Cryptography, Advances in Cryptology: Eurocrypt'94, Springer - Verleg, Berlin, pp l-129 (1995).
[3] D. Stinson, http://www.cacr.math.uwaterloo.ca/~dstinson/visual.html (2003).
[4] L. Hawkes, A.Yasinsac and C. Cline, An Application of Visual Cryptography to Financial Documents; technical report TR001001, Florida State University (2000).
[5] A. Bonnis and A. Santis, Randomness in secret sharing and visual cryptography schemes, Theor. Comput. Sci, 314, pp 351-374 (2004).
[6] N. Paul, D. Evans, A. Rubin and D. Wallach, Authentication for remote voting, workshop on human-computer interaction and security systems, Fort Lauderdale, Florida, April (2003).
[7] C. Yang, A note on Efficient Color Visual Encryption, vol.18, pp 367- 372 (2002).
[8] W. Stallings, Cryptography and Security, third edition, Prentice Hall, (2003).