Abstract
This paper proposes a scheme to hide two watermarks in visual secret sharing of a gray level image. One watermark is embedded during secret image halftoning, and the other is hidden during the halftone image encryption. A non-expansion visual secret sharing model is used to encrypt the halftone image. In watermark extraction, only Exclusive-OR operation is needed, and basic properties of conventional visual cryptography technique are still preserved. Experimental results show the effectiveness of our schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. on Image Processing 15(8), 2441–2453 (2006)
Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters 24, 349–358 (2003)
Blundo, C., Santis, A.D., Naor, M.: Visual cryptography for grey level images. Information Processing Letters 75(6), 255–259 (2000)
Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive Color Visual Cryptography. Journal of Electronic Imaging 14(3) (2005)
Hou, Y.C.: Visual cryptography for color image. Pattern Recognition 36(7), 1619–1629 (2003)
Chang, C.-C., Yu, T.-X.: Sharing a secret gray image in multiple images. In: IEEE Proceedings of the First International Symposium on Cyber Worlds, pp. 230–237 (2002)
Lukac, R., Plataniotis, K.N.: Colour Image Secret Sharing. IEE Electronics Letters 40(9), 529–530 (2004)
Pan, J.S., Huang, H.C., Jain, L.C.: Intelligent Watermarking Techniques. World Scientific Publishing Company, Singapore (2004)
Fang, W.P., Lin, J.C.: Visual Cryptography with Extra Ability of Hiding Confidential Data. Journal of Electronic Imaging 15(2) (2006)
Ito, R., Kuwakado, H., Tanka, H.: Image size invariant visual cryptography. IEICE Trans. Fundamentals E82-A(10), 2172–2177 (1999)
Floyd, R., Steinberg, L.: An adaptive algorithm for spatial gray scale. SID. Int. Symp. Dig. Tech. Papers, 36-37 (1975)
Jarvis, J.F., Judice, C.N., Ninke, W.H.: A survey of techniques for the display of continuous-tone pictures on bilevel displays. Computer Graphics Image Process 5, 13–40 (1976)
Stucki, P.: MECCA - A multiple error correcting computation algorithm for bilevel image hardcopy reproduction, Research Report RZ1060, IBM Res. Lab., Zurich, Switzerland (1981)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Luo, H., Lu, ZM., Pan, JS. (2008). Multiple Watermarking in Visual Cryptography. In: Shi, Y.Q., Kim, HJ., Katzenbeisser, S. (eds) Digital Watermarking. IWDW 2007. Lecture Notes in Computer Science, vol 5041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92238-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-92238-4_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-92237-7
Online ISBN: 978-3-540-92238-4
eBook Packages: Computer ScienceComputer Science (R0)