Abstract
Digital technology has resulted in a cost effective and easy means for storage and communication of the multimedia data, which can also be easily downloadable and reproducible. Hence, there is a growing need for techniques that identify the right owner of Intellectual Property (IP). Visual Cryptography based Lossless Watermarking (VCLW) techniques are hybrid schemes that are now being developed as a potential replacement for conventional watermarking systems as they are effective in resolving existing tradeoff among the requirements. This paper presents theoretical analysis of spatial domain VCLW techniques and performs practical performance analysis, to identify gaps. These hybrid techniques offer promising quality of target image after watermarking; there are still a number of challenges associated such as security, robustness, pixel expansion, complexity, image formats etc. Among multiple requirements, achieving fewer rates of false positives is identified as fundamental requirement in order to discourage malicious owners and to protect Intellectual Property. The analysis of comparative results shows that with the existing techniques, the false positive rate could not reach 10−6, which is the maximum limit suggested by Cox et al. for watermarking. This is due to the unique security challenge called C3 rule that involves the design of code tables, selection of features, thresholds and combination functions. It is concluded that in the applications where the images to be protected are very sensitive such as military, medical and satellite images, VCLW techniques can be a potential replacement for conventional watermarking systems, given that the algorithms fills the important gaps.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cox, I.J., Mille, M.L., Bloom, J.A.: Watermarking applications and their properties. In: Proceedings of International Conference Information Technology: Coding and Computing, Las Vegas, NV, USA, pp. 6–10 (2000)
Surekha, B., Swamy, G.N.: Digital image ownership verification based on spatial correlation of colors. In: Proceedings of IET Conference on Image Processing, pp. 1–5. University of Westminster, London (2012)
Wan, Y.H., Yuan, Q.L., Ji, S.M., He, L.M., Wang, Y.L.: A survey of the image copy detection. In: Proceedings of IEEE Conference on Cybernetics and Intelligent Systems, Chengdu, pp. 738–743 (2008)
Tsai, H.H., Tseng, H.C., Lai, Y.S.: Robust lossless image watermarking based on a-trimmed mean algorithm and support vector machine. J. Syst. Softw. 83, 1015–1028 (2010)
Naor, M., Shamir, A.: Visual cryptography. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques-Advances in Cryptology, Perugia, Italy, pp. 1–12 (1994)
Hwang, R.: Digital image copyright protection scheme based on visual cryptography. Tamkang J. Sci. Eng. 3(2), 96–106 (2000)
Hou, Y.C.: Copyright protection based on visual cryptography. In: Proceedings of 6th World Multi Conference on Systemics, Cybernetics and Informatics, Orlando, FL, USA, vol. 13, pp. 104–109 (2002)
Nag, A., Singh, J.P., Biswas, S., Sarkar, D., Sarkar, P.P.: A novel copyright protection scheme using visual cryptography. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) Advances in Computing and Communications. CCIS, vol. 191, pp. 612–619. Springer, Heidelberg (2011)
Zaghloul, R.I., Al-Rawashdeh, E.F.: HSV image watermarking scheme based on visual cryptography. World Acad. Sci. Eng. Technol. J. 44, 482–485 (2008)
Hou, Y.C., Huang, P.H.: Image protection based on visual cryptography and statistical property. In: Proceedings of IEEE Statistical Signal Processing Workshop, Nice, France, pp. 481–484 (2011)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 481–494 (2004)
Singh, K.M.: Dual watermarking scheme for copyright protection. Int. J. Comput. Sci. Eng. Syst. 3(2), 99–106 (2009)
Hsu, C.S.: A study of visual cryptography and its applications to copyright protection based on goal programming and statistics. Ph.D. Dissertation, National Central University, Department of Information Management, Taiwan (2004)
Surekha, B., Swamy, G.N.: A spatial domain public image watermarking. Int. J. Secur. Appl. 5(1), 1–11 (2011)
Surekha, B., Swamy, G.N.: Lossless watermarking technique for copyright protection of high resolution images. In: Proceedings of IEEE TENSYMP 2014, Kaula Lumpur, Malaysia, pp. 73–78 (2014)
Wang, M.S., Chen, W.C.: Digital image copyright protection scheme based on visual cryptography and singular value decomposition. Opt. Eng. 46(6), 1–8 (2007)
Chang, C.C., Chuang, J.C.: An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recogn. Lett. 23, 931–941 (2002)
Hwang, R.J., Chang, C.C.: Hiding a picture in two pictures. Opt. Eng. 40, 342–351 (2001)
Tu, S.F., Hsu, C.S.: A BTC-based watermarking scheme for digital images. Int. J. Inf. Secur. 15(2), 214–226 (2004)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 481–494 (2004)
Mahmoud Hassan, A., Mohammed Khalili, A.: Self watermarking based on visual cryptography. World Acad. Sci. Eng. Technol. J. 8, 159–162 (2005)
Sliet, A., Abusitta, A.: A visual cryptography based watermark technology for individual and group images. Systemics Cybern. Inf. 5(2), 24–32 (2008)
Ying, S., Yinlan, Y.: Visual cryptography based multiparty copyright protect scheme. In: Proceedings of 2nd International Conference on Advanced Computer Control, Shenyang, Liaoning, China, vol. 2, pp. 223–226 (2010)
Gavini, N.S., Surekha, B.: Lossless watermarking technique for copyright protection of high resolution images. In: IEEE Region 10 Symposium, Malaysia, pp. 77–82 (2014)
http://www.imageprocessingplace.com/DIP3E/dip3e_book_images_downloads.htm
Surekha, B., Ravi Babu, P., Swamy, G.N.: Security analysis of a novel copyright protection scheme using visual cryptography. In: IEEE International Conference on Computing and Communication Technologies, Osmania University, Hyderabad, pp. 1–5 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Borra, S., S., V., H.R., L. (2016). Visual Cryptography Based Lossless Watermarking for Sensitive Images. In: Panigrahi, B., Suganthan, P., Das, S., Satapathy, S. (eds) Swarm, Evolutionary, and Memetic Computing. SEMCCO 2015. Lecture Notes in Computer Science(), vol 9873. Springer, Cham. https://doi.org/10.1007/978-3-319-48959-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-48959-9_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48958-2
Online ISBN: 978-3-319-48959-9
eBook Packages: Computer ScienceComputer Science (R0)