Skip to main content

Visual Cryptography Based Lossless Watermarking for Sensitive Images

  • Conference paper
  • First Online:
Swarm, Evolutionary, and Memetic Computing (SEMCCO 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9873))

Included in the following conference series:

Abstract

Digital technology has resulted in a cost effective and easy means for storage and communication of the multimedia data, which can also be easily downloadable and reproducible. Hence, there is a growing need for techniques that identify the right owner of Intellectual Property (IP). Visual Cryptography based Lossless Watermarking (VCLW) techniques are hybrid schemes that are now being developed as a potential replacement for conventional watermarking systems as they are effective in resolving existing tradeoff among the requirements. This paper presents theoretical analysis of spatial domain VCLW techniques and performs practical performance analysis, to identify gaps. These hybrid techniques offer promising quality of target image after watermarking; there are still a number of challenges associated such as security, robustness, pixel expansion, complexity, image formats etc. Among multiple requirements, achieving fewer rates of false positives is identified as fundamental requirement in order to discourage malicious owners and to protect Intellectual Property. The analysis of comparative results shows that with the existing techniques, the false positive rate could not reach 10−6, which is the maximum limit suggested by Cox et al. for watermarking. This is due to the unique security challenge called C3 rule that involves the design of code tables, selection of features, thresholds and combination functions. It is concluded that in the applications where the images to be protected are very sensitive such as military, medical and satellite images, VCLW techniques can be a potential replacement for conventional watermarking systems, given that the algorithms fills the important gaps.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cox, I.J., Mille, M.L., Bloom, J.A.: Watermarking applications and their properties. In: Proceedings of International Conference Information Technology: Coding and Computing, Las Vegas, NV, USA, pp. 6–10 (2000)

    Google Scholar 

  2. Surekha, B., Swamy, G.N.: Digital image ownership verification based on spatial correlation of colors. In: Proceedings of IET Conference on Image Processing, pp. 1–5. University of Westminster, London (2012)

    Google Scholar 

  3. Wan, Y.H., Yuan, Q.L., Ji, S.M., He, L.M., Wang, Y.L.: A survey of the image copy detection. In: Proceedings of IEEE Conference on Cybernetics and Intelligent Systems, Chengdu, pp. 738–743 (2008)

    Google Scholar 

  4. Tsai, H.H., Tseng, H.C., Lai, Y.S.: Robust lossless image watermarking based on a-trimmed mean algorithm and support vector machine. J. Syst. Softw. 83, 1015–1028 (2010)

    Article  Google Scholar 

  5. Naor, M., Shamir, A.: Visual cryptography. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques-Advances in Cryptology, Perugia, Italy, pp. 1–12 (1994)

    Google Scholar 

  6. Hwang, R.: Digital image copyright protection scheme based on visual cryptography. Tamkang J. Sci. Eng. 3(2), 96–106 (2000)

    Google Scholar 

  7. Hou, Y.C.: Copyright protection based on visual cryptography. In: Proceedings of 6th World Multi Conference on Systemics, Cybernetics and Informatics, Orlando, FL, USA, vol. 13, pp. 104–109 (2002)

    Google Scholar 

  8. Nag, A., Singh, J.P., Biswas, S., Sarkar, D., Sarkar, P.P.: A novel copyright protection scheme using visual cryptography. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) Advances in Computing and Communications. CCIS, vol. 191, pp. 612–619. Springer, Heidelberg (2011)

    Google Scholar 

  9. Zaghloul, R.I., Al-Rawashdeh, E.F.: HSV image watermarking scheme based on visual cryptography. World Acad. Sci. Eng. Technol. J. 44, 482–485 (2008)

    Google Scholar 

  10. Hou, Y.C., Huang, P.H.: Image protection based on visual cryptography and statistical property. In: Proceedings of IEEE Statistical Signal Processing Workshop, Nice, France, pp. 481–484 (2011)

    Google Scholar 

  11. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 481–494 (2004)

    Article  Google Scholar 

  12. Singh, K.M.: Dual watermarking scheme for copyright protection. Int. J. Comput. Sci. Eng. Syst. 3(2), 99–106 (2009)

    Google Scholar 

  13. Hsu, C.S.: A study of visual cryptography and its applications to copyright protection based on goal programming and statistics. Ph.D. Dissertation, National Central University, Department of Information Management, Taiwan (2004)

    Google Scholar 

  14. Surekha, B., Swamy, G.N.: A spatial domain public image watermarking. Int. J. Secur. Appl. 5(1), 1–11 (2011)

    Google Scholar 

  15. Surekha, B., Swamy, G.N.: Lossless watermarking technique for copyright protection of high resolution images. In: Proceedings of IEEE TENSYMP 2014, Kaula Lumpur, Malaysia, pp. 73–78 (2014)

    Google Scholar 

  16. Wang, M.S., Chen, W.C.: Digital image copyright protection scheme based on visual cryptography and singular value decomposition. Opt. Eng. 46(6), 1–8 (2007)

    Google Scholar 

  17. Chang, C.C., Chuang, J.C.: An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recogn. Lett. 23, 931–941 (2002)

    Article  MATH  Google Scholar 

  18. Hwang, R.J., Chang, C.C.: Hiding a picture in two pictures. Opt. Eng. 40, 342–351 (2001)

    Article  Google Scholar 

  19. Tu, S.F., Hsu, C.S.: A BTC-based watermarking scheme for digital images. Int. J. Inf. Secur. 15(2), 214–226 (2004)

    Google Scholar 

  20. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 481–494 (2004)

    Article  Google Scholar 

  21. Mahmoud Hassan, A., Mohammed Khalili, A.: Self watermarking based on visual cryptography. World Acad. Sci. Eng. Technol. J. 8, 159–162 (2005)

    Google Scholar 

  22. Sliet, A., Abusitta, A.: A visual cryptography based watermark technology for individual and group images. Systemics Cybern. Inf. 5(2), 24–32 (2008)

    Google Scholar 

  23. Ying, S., Yinlan, Y.: Visual cryptography based multiparty copyright protect scheme. In: Proceedings of 2nd International Conference on Advanced Computer Control, Shenyang, Liaoning, China, vol. 2, pp. 223–226 (2010)

    Google Scholar 

  24. Gavini, N.S., Surekha, B.: Lossless watermarking technique for copyright protection of high resolution images. In: IEEE Region 10 Symposium, Malaysia, pp. 77–82 (2014)

    Google Scholar 

  25. http://www.imageprocessingplace.com/DIP3E/dip3e_book_images_downloads.htm

  26. Surekha, B., Ravi Babu, P., Swamy, G.N.: Security analysis of a novel copyright protection scheme using visual cryptography. In: IEEE International Conference on Computing and Communication Technologies, Osmania University, Hyderabad, pp. 1–5 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Surekha Borra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Borra, S., S., V., H.R., L. (2016). Visual Cryptography Based Lossless Watermarking for Sensitive Images. In: Panigrahi, B., Suganthan, P., Das, S., Satapathy, S. (eds) Swarm, Evolutionary, and Memetic Computing. SEMCCO 2015. Lecture Notes in Computer Science(), vol 9873. Springer, Cham. https://doi.org/10.1007/978-3-319-48959-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48959-9_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48958-2

  • Online ISBN: 978-3-319-48959-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics