Commenced in January 2007
Paper Count: 31108
Watermarking Scheme for Color Images using Wavelet Transform based Texture Properties and Secret Sharing
Abstract:In this paper, a new secure watermarking scheme for color image is proposed. It splits the watermark into two shares using (2, 2)- threshold Visual Cryptography Scheme (V CS) with Adaptive Order Dithering technique and embeds one share into high textured subband of Luminance channel of the color image. The other share is used as the key and is available only with the super-user or the author of the image. In this scheme only the super-user can reveal the original watermark. The proposed scheme is dynamic in the sense that to maintain the perceptual similarity between the original and the watermarked image the selected subband coefficients are modified by varying the watermark scaling factor. The experimental results demonstrate the effectiveness of the proposed scheme. Further, the proposed scheme is able to resist all common attacks even with strong amplitude.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1070217Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1779
 I.J. Cox, M.L. Miller and J. A. Bloom, J. Fridrich, T. Kalker, Digital Watermarking and Steganography, Second edition, Morgan Kaufmann Publishers, 2008.
 Ching-Tang Hsieh, Yeh-Kuang Wu, Digital Image Multiresolution Watermark Based on Human Visual System Using Error Correcting Code,Tamkang Journal of Science and Engineering, Vol. 4, No. 3, 2001, pp. 201-208.
 Cox, I. Robust watermarking, ENCRYPT Summer School on Multimedia Security, Salzburg, Austria, Sept. 22, 2005.
 Podilchuk, C., Zeng, W.,Image-Adaptive Watermarking Using Visual Models, IEEE Journal on Selected Areas in Communications, Issue 16, vol.4, 1998, pp. 525-539.
 Barni, M., Bartolini, F., Piva, A Improved wavelet-based watermarking through pixel-wise masking, IEEE Transaction, Image Processing, Issue 10, vol. 5, 2001, pp. 783-791.
 J. R. Smith and S. F. Chang., Automated Binary Texture Feature Sets for Image Retrieval, International Proceedings, International Conference on Acoustics, Speech, and Signal Processing, 1996, pp. 2241-2246.
 Mallat,S., A theory for multiresolution signal decomposition: the wavelet representation, IEEE Transaction. Pattern Analysis and Machine Intelligence, vol.11, No.7, 1989, pp. 674-693.
 S. Arivazhagan, L. Ganesan, Texture classification using wavelet transform, Elsevier, Pattern Recognitation letter.24, 2003, pp.1513-1521.
 M. Naor, A. Shamir, Visual cryptography, Advances in Cryptology, Eurocrypt 94, Lecture Notes in Computer Science, Vol. 950, 1995, pp. 1-12.
 Young-Chang Hou,Pei-Min Chen, An Asymmetric Watermarking Scheme based on Visual Cryptography, IEEE Proceedings of ICSP, 2000, pp. 992-995.
 Shang-Lin Hsieh, I-Ju Tsai, Bin-Yuan Huang, and Jh-Jie Jian, Protecting Copyrights of Color Images using a Watermarking Scheme Based on Secret Sharing and Wavelet Transform, Journal of Multimedia, vol. 3, No. 4, 2008, pp. 42-49.
 Verheul, Van Tilborg, Construction and Properties of k out of n visual secret sharing scheme Designs, Codes and Cryptography, Vol. 11, 1997, pp. 179-196.
 C. Lin, T.H. Tsai, Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters 24, 2003, pp. 349-358.
 Yuefeng Zhang, Space-Filling Curve Ordered Dither, Elsevier, Computer & Graphics Journal, Vol. 22, No. 4, 1998, pp. 559-563.
 Yuefeng Zhang, Adaptive Ordered Dither, Graphical, Models and Image Processing, Vol. 59, No. 1, 1997, pp. 49-53.
 L.Velho and J.Gomes, Stochastic screening dithering with adaptive clustering, Proceedings of SIGGRAPH-95, ACM Computer Graphics, Annual Conference Series, 1995, pp. 273-276.