Skip to main content

Multiple Watermarking in Visual Cryptography

  • Conference paper
Digital Watermarking (IWDW 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5041))

Included in the following conference series:

Abstract

This paper proposes a scheme to hide two watermarks in visual secret sharing of a gray level image. One watermark is embedded during secret image halftoning, and the other is hidden during the halftone image encryption. A non-expansion visual secret sharing model is used to encrypt the halftone image. In watermark extraction, only Exclusive-OR operation is needed, and basic properties of conventional visual cryptography technique are still preserved. Experimental results show the effectiveness of our schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  2. Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. on Image Processing 15(8), 2441–2453 (2006)

    Article  Google Scholar 

  3. Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters 24, 349–358 (2003)

    Article  MATH  Google Scholar 

  4. Blundo, C., Santis, A.D., Naor, M.: Visual cryptography for grey level images. Information Processing Letters 75(6), 255–259 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  5. Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive Color Visual Cryptography. Journal of Electronic Imaging 14(3) (2005)

    Google Scholar 

  6. Hou, Y.C.: Visual cryptography for color image. Pattern Recognition 36(7), 1619–1629 (2003)

    Article  Google Scholar 

  7. Chang, C.-C., Yu, T.-X.: Sharing a secret gray image in multiple images. In: IEEE Proceedings of the First International Symposium on Cyber Worlds, pp. 230–237 (2002)

    Google Scholar 

  8. Lukac, R., Plataniotis, K.N.: Colour Image Secret Sharing. IEE Electronics Letters 40(9), 529–530 (2004)

    Article  Google Scholar 

  9. Pan, J.S., Huang, H.C., Jain, L.C.: Intelligent Watermarking Techniques. World Scientific Publishing Company, Singapore (2004)

    Book  MATH  Google Scholar 

  10. Fang, W.P., Lin, J.C.: Visual Cryptography with Extra Ability of Hiding Confidential Data. Journal of Electronic Imaging 15(2) (2006)

    Google Scholar 

  11. Ito, R., Kuwakado, H., Tanka, H.: Image size invariant visual cryptography. IEICE Trans. Fundamentals E82-A(10), 2172–2177 (1999)

    Google Scholar 

  12. Floyd, R., Steinberg, L.: An adaptive algorithm for spatial gray scale. SID. Int. Symp. Dig. Tech. Papers, 36-37 (1975)

    Google Scholar 

  13. Jarvis, J.F., Judice, C.N., Ninke, W.H.: A survey of techniques for the display of continuous-tone pictures on bilevel displays. Computer Graphics Image Process 5, 13–40 (1976)

    Article  Google Scholar 

  14. Stucki, P.: MECCA - A multiple error correcting computation algorithm for bilevel image hardcopy reproduction, Research Report RZ1060, IBM Res. Lab., Zurich, Switzerland (1981)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Luo, H., Lu, ZM., Pan, JS. (2008). Multiple Watermarking in Visual Cryptography. In: Shi, Y.Q., Kim, HJ., Katzenbeisser, S. (eds) Digital Watermarking. IWDW 2007. Lecture Notes in Computer Science, vol 5041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92238-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-92238-4_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-92237-7

  • Online ISBN: 978-3-540-92238-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics