Skip to main content
Log in

A new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a new Visual Cryptography based watermarking scheme for multiple cover images is proposed. The proposed scheme conceals watermark without altering the original cover images. First, it extracts the feature shares by applying the discrete wavelet transform (DWT), Singular value decomposition (SVD), and scale invariant feature transform (SIFT) on the cover images. The extracted feature shares are then used together with the private key and watermark to construct a secret share. The secret share should be registered with a trust authority. When a dispute over cover images happens, watermark can be extracted by using private key, feature shares, and secret share. The experimental results showed the method robustness versus various attacks, especially rotation and scaling.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Chang CC, Chung JC (2002) An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recogn Lett 23:931–941

    Article  MATH  Google Scholar 

  2. Chang CC, Tsai PY, Lin MH (2005) SVD-based digital image watermarking scheme. Pattern Recogn Lett 26:1577–1586

    Article  Google Scholar 

  3. Chen TH, Chang CC, Wu CS, Lou DC (2009) On the security of a copyright protection scheme based on visual cryptography. Comput Stand Interfaces 31:1–5

    Article  Google Scholar 

  4. Horngm S, Rosiyadi D, Fan P, Wang X, Khurram Khan M, Pan Y (2012) An efficient copyright protection scheme for e-government document images. IEEE Multimedia 62–73

  5. Hsieh SL, Huang BY (2004) A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation. Proceedings of International Computer Symposium, p 661–666

  6. Hsu CS, Hou YC (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44:077003

    Article  Google Scholar 

  7. Huang F, Guan ZH (2004) A hybrid SVD-DCT watermarking method based on LPSNR. Pattern Recogn Lett 25:1769–1775

    Article  Google Scholar 

  8. Klema VC (1980) The singular value decomposition: its computation and some applications. IEEE Trans Autom Control 25:164–176

    Article  MathSciNet  MATH  Google Scholar 

  9. Lee JS, Wong HS, Wang YH (2014) Variation-free watermarking technique based on scale relationship. Computer science and information technology (CS & IT), p 225–239

  10. Lin WH, Horng SJ, Kao TW, Chen RJ, Chen YH, Lee CL, Terano T (2009) Image copyright protection with forward error correction. Expert Systems with Applications, p 11888–11894

  11. Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 746–757

  12. Lin Y-T, Huang C-Y, Lee GC (2011) Rotation, scaling, and translation resilient watermarking for images. IET Image Process 5(4):328–340

    Article  Google Scholar 

  13. Lin WH, Wang YR, Horng SJ (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Systems with Applications, p 9869–9878

  14. Liu F, Wu C-K (2011) Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners. IET J 121–128

  15. Liu F, Wu CK, Lin XJ (2009) Some extensions on threshold visual cryptography schemes. Comput J 107–119

  16. Lou DC, Tso HK, Liu JL (2007) A copyright protection scheme for digital images using visual cryptography technique. Comput Stand Interfaces 29:125–131

    Article  Google Scholar 

  17. Lowe DG (2004) Distinctive image features from scale-invariant keypoints’. Int J Comput Vis 60(2):91–110

    Article  Google Scholar 

  18. Naor M, Shamir A (1995) Visual cryptography. Proceedings of Advances in Cryptology EUROCRYPT94, LNCS 950, p 1–12

  19. Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Signal Process 66:385–403

    Article  MATH  Google Scholar 

  20. Pitas I (1996) A method for signature casting on digital images. Proceedings of IEEE International Conference on Image Processing, p 215–318

  21. Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Process 1480–1491

  22. Shieh JM, Lou DC, Chang MC (2006) A semi-blind digital watermarking scheme based on singular value decomposition. Comput Stand Interfaces 28:428–440

    Article  Google Scholar 

  23. Tuyls P, Hollmann HDL, vanLint JH, Tolhuizen L (2005) Xor-based visual cryptography schemes. Des Codes Crypt 37:169–186

    Article  MathSciNet  MATH  Google Scholar 

  24. Van Schyndel RG, Tirkel AZ, Osborne CF (1994) A digital watermark. Proceedings of IEEE International Conference on Image Processing, p 86–90

  25. Wang MS, Chen WC (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Comput Stand Interfaces 31:757–762

    Article  Google Scholar 

  26. Wang CC, Tai SC, Yu CS (2000) Repeating image watermarking technique by the visual cryptography. IEICE Trans Fundam E83-A:1589–1598

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohsen Ebrahimi Moghaddam.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Amiri, T., Moghaddam, M.E. A new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover images. Multimed Tools Appl 75, 8527–8543 (2016). https://doi.org/10.1007/s11042-015-2770-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2770-7

Keywords

Navigation