Abstract
A new watermarking scheme which provides the ability of sharing secret with multi-users is proposed. It splits the original watermark into two shares and embeds one share into the cover image to increase the security. A polarization procedure is performed to establish a polarity stream from the cover image. The second share and the polarity stream are used to generate a master key and several normal keys. In our system, only the super user can reveal the genuine watermark directly. Other users possess the normal keys can obtain shadow watermarks merely. By combining the shadow watermarks together, the real watermark can be recovered.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Barni, M., Bartolini, F.: Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker, Inc., New York (2004)
Katzenbeisser, Petitcolas, F. (eds.): Information Hiding: Techniques for Steganography and Digital Watermarking. Artech House, Norwood (2000)
Huang, J., Shi, Y.Q., Shi, Y.: Embedding Image Watermarks in DC Components. IEEE Trans. Circuits and Systems for Video Technology 10(6), 974–979 (2000)
Hsu, C.T., Wu, J.L.: Hidden Digital Watermarks in Images. IEEE Trans. Image Proc. 8(1), 58–68 (1999)
Shieh, C.S., Huang, H.C., Wang, F.H., Pan, J.S.: Genetic Watermarking Based on Transform-Domain Techniques. Pattern Recognition 37(3), 555–565 (2004)
Niu, X.M., Lu, Z.M., Sun, S.H.: Digital Image Watermarking Based on Multiresolution Decomposition. Electronics Letters 36(13), 1108–1110 (2000)
Noar, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Pan, J.S., Wang, F.H., Jain, L.C., Ichalkaranje, N.: A Multistage VQ Based Watermarking Technique with Fake Watermarks. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 81–90. Springer, Heidelberg (2003)
Wang, F.H., Jain, L.C., Pan, J.S.: A Multi-user Based Watermarking System with Two- Security-Level keys. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 40–50. Springer, Heidelberg (2003)
Gersho, A., Gray, R.M.: Vector Quantization and Signal Compression. Kluwer Academic Publisher, London (1992)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, FH., Yen, K.K., Jain, L.C., Pan, JS. (2005). Shadow Watermark Extraction System. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552451_154
Download citation
DOI: https://doi.org/10.1007/11552451_154
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28895-4
Online ISBN: 978-3-540-31986-3
eBook Packages: Computer ScienceComputer Science (R0)