Skip to main content
Log in

Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors

  • Original article
  • Published:
The Visual Computer Aims and scope Submit manuscript

Abstract

Existing visual cryptography (VC)-based copyright protection schemes (Amiri and Mohaddam in Multimed Tools Appl 75(14):8527–8543, 2016; Liu and Wu in IET Inf Secur 5(2):121–128, 2011) for multiple images provide meaningless shares to the owners. These shares create a suspicion that some secret information is shared. Also, these schemes require the share of every owner to prove the copyright. If any of the ownership share is not available, the copyright of these owners cannot be verified. This makes the usage of schemes restricted. To address these issues, an extended visual cryptography-based copyright protection scheme is proposed for multiple images with multiple owners. This scheme provides meaningful ownership shares to the owners, and their copyright can be verified by using a qualified set of owner shares. In this scheme, three types of shares are used, i.e., master share, ownership share and key share. The proposed scheme ensures robustness against different geometrical attacks, especially the rotation attack, as LBP and SURF together represent the host image efficiently. There is no restriction on watermark size, as SURF gives a flexibility to select any number of feature points. Usage of LBP ensures no false positive cases. Each of the ownership shares is created using the master share and the watermark. The ownership share is used to create a key share which is stored with the Trusting Authority (TA). To prove the copyright of multiple images, the ownership images and key share are superimposed to retrieve the watermark. The experimental results show that the scheme clearly verifies the copyright of digital images and is robust against several image processing attacks while having high imperceptibility. Comparisons with the existing copyright protection schemes show better performance of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Wang, Y., Hu, S.-H.: A new watermarking method for 3d models based on integral invariants. IEEE Trans. Vis. Comput. Gr. 15(2), 285–294 (2008)

    Article  Google Scholar 

  2. Wu, J., Kobbelt, L.: Efficient spectral watermarking of large meshes with orthogonal basis functions. Vis. Comput. 21(8–10), 848–857 (2005)

    Article  Google Scholar 

  3. Cheng, Y.-M., Wang, C.-M.: A high-capacity steganographic approach for 3d polygonal meshes. The Visual Computer 22(9–11), 845–855 (2006)

    Article  Google Scholar 

  4. Li, G., et al.: Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform. Vis. Comput. 35(9), 1267–1277 (2019)

    Article  Google Scholar 

  5. Naor, M., Shamir, A.: Visual cryptography. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 1–12. Springer (1994)

  6. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended schemes for visual cryptography. Theoret. Comput. Sci. 250, 1–16 (1996)

    MATH  Google Scholar 

  7. Cox, I.J., Miller, M.L.: The first 50 years of electronic watermarking. EURASIP J. Adv. Signal Process. 2002(2), 820936 (2002)

    Article  Google Scholar 

  8. Chang, C.-C., Hsiao, J.-Y., Yeh, J.-C.: A colour image copyright protection scheme based on visual cryptography and discrete cosine transform. Imaging Sci. J. 50(3), 133–140 (2002)

    Article  Google Scholar 

  9. Hsu, C.-S., Hou, Y.-C.: Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt. Eng. 44(7), 077003 (2005)

    Article  Google Scholar 

  10. Wang, C.-C., Tai, S.-C., Yu, C-.S.: Repeating image watermarking technique by the visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 83(8), 1589–1598 (2000)

  11. Hsieh, S.-L., Hsu, L.-Y., Tsai, I.-J.: A copyright protection scheme for color images using secret sharing and wavelet transform. In: Proceedings of World Academy of Science, Engineering and Technology, volume 10 (2005)

  12. Chen, T.-H., Chang, C.-C., Wu, C.-Sn., Lou, D.-C.: On the security of a copyright protection scheme based on visual cryptography. Computer Standards & Interfaces 31(1), 1–5 (2009)

  13. Lou, D.-C., Tso, H.-K., Liu, J.-L.: A copyright protection scheme for digital images using visual cryptography technique. Comput. Standards Interfaces 29(1), 125–131 (2007)

    Article  Google Scholar 

  14. Liu, F., Wu, C.-K.: Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners. IET Inf. Secur. 5(2), 121–128 (2011)

    Article  Google Scholar 

  15. Wang, M.-S., Chen, W.-C.: A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Comput. Standards Interfaces 31(4), 757–762 (2009)

    Article  Google Scholar 

  16. Rawat, S., Raman, B.: A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion. AEU-Int. J. Electron. Commun. 66(11), 955–962 (2012)

    Article  Google Scholar 

  17. Amiri, T., Moghaddam, M.E.: A new visual cryptography based watermarking scheme using dwt and sift for multiple cover images. Multimed. Tools Appl. 75(14), 8527–8543 (2016)

    Article  Google Scholar 

  18. Hou, Y.-C., Chen, P.-M.: An asymmetric watermarking scheme based on visual cryptography. In Signal Processing Proceedings, 2000. WCCC-ICSP 2000. 5th International Conference on, volume 2, pages 992–995. IEEE (2000)

  19. Hou, Y.-C., Tseng, A,-Y., Quan, Z.-Y., Liu, H.-J.: An ipr protection scheme based on wavelet transformation and visual cryptography. Turk. J. Electr. Eng. Compu. Sci. 24(5), 4063–4082 (2016)

  20. Hwang, R.-J.: A digital image copyright protection scheme based on visual cryptography. Tamkang J. Sci. Eng. 3(2), 97–106 (2000)

    Google Scholar 

  21. Wang, M.-S., Chen, W.-C.: Digital image copyright protection scheme based on visual cryptography and singular value decomposition. Opt. Eng. 46(6), 067006 (2007)

    Article  Google Scholar 

  22. Pushpa Devi, B., Manglem Singh, K., Roy, S.: A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography. SpringerPlus 5(1), 1091 (2016)

    Article  Google Scholar 

  23. Shao, Z., Shang, Y., Zeng, R., Shu, H., Coatrieux, G., Jiasong, W.: Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Sig. Process. Image Commun. 48, 12–21 (2016)

    Article  Google Scholar 

  24. Xue, M., Yuan, C. Liu, Z., Wang, J.: SSL: A novel image hashing technique using sift keypoints with saliency detection and lbp feature extraction against combinatorial manipulations. Security and Communication Networks (2019)

  25. Fatahbeygi, A., Akhlaghian Tab, F.: A highly robust and secure image watermarking based on classification and visual cryptography. J. inf. Secur Appl. 45, 71–78 (2019)

    Google Scholar 

  26. Bay, H., Ess, A., Tuytelaars, T., Van Gool, L.: Speeded-up robust features (SURF). Comput. Vis. Image Underst. 110(3), 346–359 (2008)

    Article  Google Scholar 

  27. Karami, E., Prasad, S., Shehata, M.: Image matching using sift, surf, brief and orb: performance comparison for distorted images. arXiv preprint arXiv:1710.02726 (2017)

  28. Zhu, C., Bichot, C.-E., Chen, L.: Image region description using orthogonal combination of local binary patterns enhanced with color information. Pattern Recogn. 46(7), 1949–1963 (2013)

    Article  Google Scholar 

  29. Ojala, T., Pietikäinen, M., Harwood, D.: A comparative study of texture measures with classification based on featured distributions. Pattern Recognit. 29(1), 51–59 (1996)

    Article  Google Scholar 

  30. Prabhakar, C.J., Praveen Kumar, P.U.: LBP–SURF descriptor with color invariant and texture based features for underwater images. In: Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing, ICVGIP ’12, New York, NY, USA (2012). Association for Computing Machinery

  31. Jiang, P., Zhao, S., Cheng, S.: Rotational invariant lbp-surf for fast and robust image matching. In: 2015 9th International Conference on Signal Processing and Communication Systems (ICSPCS), pages 1–7 (2015)

  32. USC-SIPI Image Database. http://sipi.usc.edu/database/database.php?volume=misc

  33. Lee, J.-S., Wong, H.-S., Wang, Y.-H., Variation-free watermarking technique based on scale relationship. Computer science and information technology (CS & IT), 225239, (2014)

  34. Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J.J., Su, J.K.: Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Commun. Mag. 39(8), 118–126 (2001)

    Article  Google Scholar 

  35. Kutter, M., Petitcolas, F.A.P.: Fair benchmark for image watermarking systems. In: Security and Watermarking of Multimedia Contents, volume 3657, pp. 226–239. International Society for Optics and Photonics (1999)

  36. Roy, S., Pal, A.K.: A robust blind hybrid image watermarking scheme in rdwt-dct domain using arnold scrambling. Multimedia Tools Appl. 76(3), 3577–3616 (2017)

    Article  Google Scholar 

  37. Murali, P., Sankaradass, V.: An efficient roi based copyright protection scheme for digital images with svd and orthogonal polynomials transformation. Optik 170, 242–264 (2018)

    Article  Google Scholar 

  38. Ernawan, F., Kabir, M.N.: A block-based rdwt-svd image watermarking method using human visual system characteristics. Vis. Comput. pp. 1–19 (2018)

  39. Hurrah, N.N., Parah, S.A., Loan, N.A., Sheikh, J.A., Elhoseny, M., Muhammad, K.: Dual watermarking framework for privacy protection and content authentication of multimedia. Future Gen. Comput. Syst. 94, 654–673 (2019)

    Article  Google Scholar 

  40. Thanki, R., Kothari, A., Trivedi, D.: Hybrid and blind watermarking scheme in DCuT-RDWT domain. J. Inf. Secur. Appl. 46, 231–249 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sonal Kukreja.

Ethics declarations

Funding

None.

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kukreja, S., Kasana, G. & Kasana, S.S. Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors. Vis Comput 37, 1481–1498 (2021). https://doi.org/10.1007/s00371-020-01883-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00371-020-01883-9

Keywords

Navigation