Abstract
Imperceptibility, robustness and security are the most important parameters of a watermarking scheme and tradeoff between these parameters is a challenging task. In this paper, we propose a watermarking scheme to balance the tradeoff between security and imperceptibility by using visual cryptography and singular value decomposition (SVD). Watermark image is encoded into n shares using visual cryptography of shares scheme. Among the n shares any two shares belonging to qualified set of shares are chosen and embedded into U and V component of SVD. The unused shares are with the authorized owner which can be used to extract the whole watermark. This can be done by superimposing shares or bitwise logical AND operation with the binary shares extracted from U and V component of watermarked image. Moreover the U and V component of SVD are exploited to enhance the imperceptibility. Experimental results show that the proposed technique is imperceptible, secure and robust to the common image processing and other attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kutter, M., Voloshynovskiy, S.V., Herrigel, A.: Watermark copy attack, electronic imaging. Int. Soc. Opt. Photon. (2000)
Droste, S.: New results on visual cryptography. In: Advances in Cryptology CRYPTO’96. LNCS, vol. 1109, pp. 401–415. Springer, Berlin (1996)
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers Inc., San Francisco (2002)
Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87(7), 1079–1107 (1999)
Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J.J., Su, J.K.: Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Commun. Mag. 39(8) (2001)
Revenkar, P.S., Anjum, A., Gandhare, W.Z.: Survey of visual cryptography schemes. Int. J. Secur. App. 4(2), 49–56 (2010)
Naor, M., Shamir, A.: Visual Cryptography, in Advances in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1995)
Hawkes, L., Yasinsac, A. Cline, C.: An Application of Visual Cryptography to Financial Documents. Technical Report TR001001, Florida State University (2000)
Chang, C.C., Tsai, P., Lin, C.C.: SVD-based digital watermarking scheme. Pattern Recogn. Lett. 26, 1577–1586 (2005)
Liu, R., Tan, T.: An SVD-based watermarking scheme for protection rightful ownership. IEEE Trans. Multimedia 4, 121–128 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Mallick, A.K., Priyanka, Maheshkar, S. (2016). Digital Image Watermarking Scheme Based on Visual Cryptography and SVD. In: Das, S., Pal, T., Kar, S., Satapathy, S., Mandal, J. (eds) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Advances in Intelligent Systems and Computing, vol 404. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2695-6_50
Download citation
DOI: https://doi.org/10.1007/978-81-322-2695-6_50
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2693-2
Online ISBN: 978-81-322-2695-6
eBook Packages: EngineeringEngineering (R0)