Skip to main content

Visual Cryptography Based Watermarking: Definition and Meaning

  • Conference paper
The International Workshop on Digital Forensics and Watermarking 2012 (IWDW 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7809))

Included in the following conference series:

Abstract

The proliferation of digital data, and their distribution over different kinds of communication channels are making the copyright protection a very important issue in the digital world. Watermarking techniques and visual cryptographic schemes have been recently used in different approaches for the copyright protection of digital images. Watermarking is generally used to embed “secret” information into an original image, with different purposes and different features, usually as a means to assess the ownership of the modified image. Visual cryptography refers to a way to decompose a secret image into shares and distribute them to a number of participants, so that only legitimate subsets of participants can reconstruct the original image by combining their shares.

The combination of both techniques can provide some important solutions for tampering verification and the resolution of disputes on the ownership of a given image, as provided by several proposals appeared in literature. In this work we try to provide a general model for the watermarking schemes obtained from the combination with visual cryptography. Furthermore we discuss some possible extensions of the combined approach taking into account different visual cryptographic schemes where multiple participants are involved and their possible applications in new scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Unzign watermark removal software, http://www.altern.org/watermark/

  2. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation 129(2), 86–106 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  3. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer auf der Heide, F., Monien, B. (eds.) ICALP 1996. LNCS, vol. 1099, pp. 416–428. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  4. Chen, T.-H., Chang, C.-C., Wu, C.-S., Lou, D.-C.: On the security of a copyright protection scheme based on visual cryptography. Computer Standards & Interfaces 31(1), 1–5 (2009)

    Article  Google Scholar 

  5. Cimato, S., Yang, C.N.: Visual Cryptography and Secret Image Sharing. Digital Imaging and Computer Vision Series. Taylor & Francis (2011)

    Google Scholar 

  6. Craver, S., Yeo, B.-L., Yeung, M.: Technical trials and legal tribulations. Commun. ACM 41, 45–54 (1998)

    Article  Google Scholar 

  7. Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proceedings of the IEEE 87(7), 1079–1107 (1999)

    Article  Google Scholar 

  8. Hassan, M.A., Khalili, M.A.: Self watermarking based on visual cryptography. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 8, pp. 159–162 (2005)

    Google Scholar 

  9. Hou, Y.-C., Chen, P.-M.: An asymmetric watermarking scheme based on visual cryptography. In: 5th International Conference on Signal Processing Proceedings, WCCC-ICSP 2000, vol. 2, pp. 992–995 (2000)

    Google Scholar 

  10. Hsu, C.-S., Hou, Y.-C.: A visual cryptography and statistics based method for ownership identification of digital images. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 2, pp. 172–175 (2005)

    Google Scholar 

  11. Hwang, R.: A digital image copyright protection scheme based on visual cryptography. Tambang Journal of science and Engineering 3(2), 97–106 (2000)

    Google Scholar 

  12. Li, Q., Sencar, H.T., Memon, N.D.: Security issues in watermarking applications. In: ACM Workshop on Multimedia Content Protection and Security (2006)

    Google Scholar 

  13. Lou, D.-C., Tso, H.-K., Liu, J.-L.: A copyright protection scheme for digital images using visual cryptography technique. Computer Standards & Interfaces 29(1), 125–131 (2007)

    Article  Google Scholar 

  14. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  15. Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet, S., Pun, T.: Second generation benchmarking and application oriented evaluation. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 340–353. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  16. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  17. Sencar, H.T., Memon, N.D.: Watermarking and ownership problem: a revisit. In: Digital Rights Management Workshop, pp. 93–101 (2005)

    Google Scholar 

  18. Singh, R., Gupta, R.: Digital watermarking with visual cryptography in spatial domain. In: International Conference on Advanced Computing, Communication and Networks 2011, pp. 948–951 (2011)

    Google Scholar 

  19. Surekha, B., Swamy, G.N.: A spatial domain public image watermarking. International Journal of Security and Its Applications 5(1), 1–12 (2011)

    Google Scholar 

  20. Tai, G.-C., Chang, L.-W.: Visual cryptography for digital watermarking in still images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3332, pp. 50–57. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  21. Wang, F.-H., Pan, J.-S., Jain, L.C.: Watermarking with visual cryptography and gain-shape VQ. In: Wang, F.-H., Pan, J.-S., Jain, L.C. (eds.) Innovations in Dig. Watermark. Tech. SCI, vol. 232, pp. 163–172. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  22. Wang, F.-H., Pan, J.-S., Jain, L.C.: Innovations in Dig. Watermark. Tech. SCI, vol. 232. Springer, Heidelberg (2009)

    Google Scholar 

  23. Wang, M.-S., Chen, W.-C.: Digital image copyright protection scheme based on visual cryptography and singular value decomposition. Pattern Recognition 46(6), 1530–1541 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cimato, S., Yang, J.CN., Wu, CC. (2013). Visual Cryptography Based Watermarking: Definition and Meaning. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40099-5_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40098-8

  • Online ISBN: 978-3-642-40099-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics