Abstract
The proliferation of digital data, and their distribution over different kinds of communication channels are making the copyright protection a very important issue in the digital world. Watermarking techniques and visual cryptographic schemes have been recently used in different approaches for the copyright protection of digital images. Watermarking is generally used to embed “secret” information into an original image, with different purposes and different features, usually as a means to assess the ownership of the modified image. Visual cryptography refers to a way to decompose a secret image into shares and distribute them to a number of participants, so that only legitimate subsets of participants can reconstruct the original image by combining their shares.
The combination of both techniques can provide some important solutions for tampering verification and the resolution of disputes on the ownership of a given image, as provided by several proposals appeared in literature. In this work we try to provide a general model for the watermarking schemes obtained from the combination with visual cryptography. Furthermore we discuss some possible extensions of the combined approach taking into account different visual cryptographic schemes where multiple participants are involved and their possible applications in new scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Unzign watermark removal software, http://www.altern.org/watermark/
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation 129(2), 86–106 (1996)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer auf der Heide, F., Monien, B. (eds.) ICALP 1996. LNCS, vol. 1099, pp. 416–428. Springer, Heidelberg (1996)
Chen, T.-H., Chang, C.-C., Wu, C.-S., Lou, D.-C.: On the security of a copyright protection scheme based on visual cryptography. Computer Standards & Interfaces 31(1), 1–5 (2009)
Cimato, S., Yang, C.N.: Visual Cryptography and Secret Image Sharing. Digital Imaging and Computer Vision Series. Taylor & Francis (2011)
Craver, S., Yeo, B.-L., Yeung, M.: Technical trials and legal tribulations. Commun. ACM 41, 45–54 (1998)
Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proceedings of the IEEE 87(7), 1079–1107 (1999)
Hassan, M.A., Khalili, M.A.: Self watermarking based on visual cryptography. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 8, pp. 159–162 (2005)
Hou, Y.-C., Chen, P.-M.: An asymmetric watermarking scheme based on visual cryptography. In: 5th International Conference on Signal Processing Proceedings, WCCC-ICSP 2000, vol. 2, pp. 992–995 (2000)
Hsu, C.-S., Hou, Y.-C.: A visual cryptography and statistics based method for ownership identification of digital images. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 2, pp. 172–175 (2005)
Hwang, R.: A digital image copyright protection scheme based on visual cryptography. Tambang Journal of science and Engineering 3(2), 97–106 (2000)
Li, Q., Sencar, H.T., Memon, N.D.: Security issues in watermarking applications. In: ACM Workshop on Multimedia Content Protection and Security (2006)
Lou, D.-C., Tso, H.-K., Liu, J.-L.: A copyright protection scheme for digital images using visual cryptography technique. Computer Standards & Interfaces 29(1), 125–131 (2007)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet, S., Pun, T.: Second generation benchmarking and application oriented evaluation. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 340–353. Springer, Heidelberg (2001)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998)
Sencar, H.T., Memon, N.D.: Watermarking and ownership problem: a revisit. In: Digital Rights Management Workshop, pp. 93–101 (2005)
Singh, R., Gupta, R.: Digital watermarking with visual cryptography in spatial domain. In: International Conference on Advanced Computing, Communication and Networks 2011, pp. 948–951 (2011)
Surekha, B., Swamy, G.N.: A spatial domain public image watermarking. International Journal of Security and Its Applications 5(1), 1–12 (2011)
Tai, G.-C., Chang, L.-W.: Visual cryptography for digital watermarking in still images. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3332, pp. 50–57. Springer, Heidelberg (2004)
Wang, F.-H., Pan, J.-S., Jain, L.C.: Watermarking with visual cryptography and gain-shape VQ. In: Wang, F.-H., Pan, J.-S., Jain, L.C. (eds.) Innovations in Dig. Watermark. Tech. SCI, vol. 232, pp. 163–172. Springer, Heidelberg (2009)
Wang, F.-H., Pan, J.-S., Jain, L.C.: Innovations in Dig. Watermark. Tech. SCI, vol. 232. Springer, Heidelberg (2009)
Wang, M.-S., Chen, W.-C.: Digital image copyright protection scheme based on visual cryptography and singular value decomposition. Pattern Recognition 46(6), 1530–1541 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cimato, S., Yang, J.CN., Wu, CC. (2013). Visual Cryptography Based Watermarking: Definition and Meaning. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-40099-5_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40098-8
Online ISBN: 978-3-642-40099-5
eBook Packages: Computer ScienceComputer Science (R0)