Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3682))

Abstract

A new watermarking scheme which provides the ability of sharing secret with multi-users is proposed. It splits the original watermark into two shares and embeds one share into the cover image to increase the security. A polarization procedure is performed to establish a polarity stream from the cover image. The second share and the polarity stream are used to generate a master key and several normal keys. In our system, only the super user can reveal the genuine watermark directly. Other users possess the normal keys can obtain shadow watermarks merely. By combining the shadow watermarks together, the real watermark can be recovered.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Barni, M., Bartolini, F.: Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker, Inc., New York (2004)

    Google Scholar 

  2. Katzenbeisser, Petitcolas, F. (eds.): Information Hiding: Techniques for Steganography and Digital Watermarking. Artech House, Norwood (2000)

    Google Scholar 

  3. Huang, J., Shi, Y.Q., Shi, Y.: Embedding Image Watermarks in DC Components. IEEE Trans. Circuits and Systems for Video Technology 10(6), 974–979 (2000)

    Article  Google Scholar 

  4. Hsu, C.T., Wu, J.L.: Hidden Digital Watermarks in Images. IEEE Trans. Image Proc. 8(1), 58–68 (1999)

    Article  Google Scholar 

  5. Shieh, C.S., Huang, H.C., Wang, F.H., Pan, J.S.: Genetic Watermarking Based on Transform-Domain Techniques. Pattern Recognition 37(3), 555–565 (2004)

    Article  Google Scholar 

  6. Niu, X.M., Lu, Z.M., Sun, S.H.: Digital Image Watermarking Based on Multiresolution Decomposition. Electronics Letters 36(13), 1108–1110 (2000)

    Article  Google Scholar 

  7. Noar, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  8. Pan, J.S., Wang, F.H., Jain, L.C., Ichalkaranje, N.: A Multistage VQ Based Watermarking Technique with Fake Watermarks. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 81–90. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Wang, F.H., Jain, L.C., Pan, J.S.: A Multi-user Based Watermarking System with Two- Security-Level keys. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 40–50. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Gersho, A., Gray, R.M.: Vector Quantization and Signal Compression. Kluwer Academic Publisher, London (1992)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, FH., Yen, K.K., Jain, L.C., Pan, JS. (2005). Shadow Watermark Extraction System. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552451_154

Download citation

  • DOI: https://doi.org/10.1007/11552451_154

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28895-4

  • Online ISBN: 978-3-540-31986-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics