Abstract
In this paper, we proposed a robust watermarking worked for multiple images and multiple users. This scheme adopted polynomial-based image secret sharing, DWT transform, and chaos technique. Secret sharing scheme provides better efficient on protecting copyright with multiple users, specifically in some situation, we are not easy to recover watermark by all participants. In order to verify copyright easier, we use polynomial-based image secret sharing scheme to reach a supervised verification. Any two users whose owns capability can recover the watermark with the trust authority. The experimental result shows that this scheme is efficient and robust.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hou, Y.C., Chen, P.M.: An asymmetric watermarking scheme based on visual cryptography. In: Proceedings of WCCC-ICSP, 5th Int. Conf. on Signal Processing, pp. 992–995 (2000)
Hsu, C.S., Hou, Y.C.: Copyright protection scheme for digital images using visual cryptography and sampling methods. Optical Engineering 44(7), 077003.1–077003.10 (2005)
Lou, D.C., Tso, H.K., Liu, J.L.: A copyright protection scheme for digital images using visual cryptography technique. Computer Standards & Interfaces 29(1), 1530–1541 (2006)
Liu, F., Wu, C.K.: Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners. Information Security (IET) 5(2), 121–128 (2011)
Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)
Tai, G.-C., Chang, L.-W.: Visual cryptography for digital watermarking in still images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004, Part II. LNCS, vol. 3332, pp. 50–57. Springer, Heidelberg (2004)
Voyatzis, G., Pitas, I.: Applications of toralautomorphisms in image watermarking. In: Proceedings of Image Processing, vol. 2, pp. 237–240. Thessaloniki Univ., Greece (1996)
Wang, M.S., Chen, W.C.: A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Computer Standards & Interfaces 31(4), 757–762 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Chang, SS., Lin, CH., Chen, TH., Lin, KS. (2014). Robust Watermarking for Multiple Images and Users Based on Visual Cryptography. In: Pan, JS., Krömer, P., Snášel, V. (eds) Genetic and Evolutionary Computing. Advances in Intelligent Systems and Computing, vol 238. Springer, Cham. https://doi.org/10.1007/978-3-319-01796-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-01796-9_18
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01795-2
Online ISBN: 978-3-319-01796-9
eBook Packages: EngineeringEngineering (R0)