Skip to main content

Digital Image Watermarking Scheme Based on Visual Cryptography and SVD

  • Conference paper
  • First Online:
  • 826 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 404))

Abstract

Imperceptibility, robustness and security are the most important parameters of a watermarking scheme and tradeoff between these parameters is a challenging task. In this paper, we propose a watermarking scheme to balance the tradeoff between security and imperceptibility by using visual cryptography and singular value decomposition (SVD). Watermark image is encoded into n shares using visual cryptography of shares scheme. Among the n shares any two shares belonging to qualified set of shares are chosen and embedded into U and V component of SVD. The unused shares are with the authorized owner which can be used to extract the whole watermark. This can be done by superimposing shares or bitwise logical AND operation with the binary shares extracted from U and V component of watermarked image. Moreover the U and V component of SVD are exploited to enhance the imperceptibility. Experimental results show that the proposed technique is imperceptible, secure and robust to the common image processing and other attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kutter, M., Voloshynovskiy, S.V., Herrigel, A.: Watermark copy attack, electronic imaging. Int. Soc. Opt. Photon. (2000)

    Google Scholar 

  2. Droste, S.: New results on visual cryptography. In: Advances in Cryptology CRYPTO’96. LNCS, vol. 1109, pp. 401–415. Springer, Berlin (1996)

    Google Scholar 

  3. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers Inc., San Francisco (2002)

    Google Scholar 

  4. Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87(7), 1079–1107 (1999)

    Article  Google Scholar 

  5. Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J.J., Su, J.K.: Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Commun. Mag. 39(8) (2001)

    Google Scholar 

  6. Revenkar, P.S., Anjum, A., Gandhare, W.Z.: Survey of visual cryptography schemes. Int. J. Secur. App. 4(2), 49–56 (2010)

    Google Scholar 

  7. Naor, M., Shamir, A.: Visual Cryptography, in Advances in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1995)

    MATH  Google Scholar 

  8. Hawkes, L., Yasinsac, A. Cline, C.: An Application of Visual Cryptography to Financial Documents. Technical Report TR001001, Florida State University (2000)

    Google Scholar 

  9. Chang, C.C., Tsai, P., Lin, C.C.: SVD-based digital watermarking scheme. Pattern Recogn. Lett. 26, 1577–1586 (2005)

    Google Scholar 

  10. Liu, R., Tan, T.: An SVD-based watermarking scheme for protection rightful ownership. IEEE Trans. Multimedia 4, 121–128 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ajay Kumar Mallick .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Mallick, A.K., Priyanka, Maheshkar, S. (2016). Digital Image Watermarking Scheme Based on Visual Cryptography and SVD. In: Das, S., Pal, T., Kar, S., Satapathy, S., Mandal, J. (eds) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Advances in Intelligent Systems and Computing, vol 404. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2695-6_50

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2695-6_50

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2693-2

  • Online ISBN: 978-81-322-2695-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics