Skip to main content
Log in

Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A copyright protection scheme based on curvelet transform, k-means clustering and extended visual cryptography is proposed for color images. Unlike the existing schemes, the proposed scheme creates meaningful shares to provide better security and handles false positive cases efficiently. Curvelet Transform is applied on Y component of host image to generate six-scale layers. Out of these layers, non fine scale layers are selected to generate the master share, which is further processed by Henon map to enhance its security. Two watermarks are used in the proposed scheme. One of them is provided by the user and other one is constructed by using Cb and Cr components of the host image. Second watermark is used to to handle false positives. Meaningful ownership share is constructed from the master share, both watermarks and cover image by using extended visual secret sharing. Master share is overlapped with its corresponding ownership share to reveal the watermark which is further used to prove the ownership. Experimental results show that the proposed scheme clearly verifies the copyright of the digital images, is robust to withstand several image processing attacks and handles false positive cases efficiently. Comparison with the existing copyright protection schemes shows that the proposed scheme gives better performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Abraham J, Paul V (2019) An imperceptible spatial domain color image watermarking scheme. J King Saud Univ-Comput Inf Sci 31(1):125–133

    Google Scholar 

  2. Agarwal S (2018) A review of image scrambling technique using chaotic maps. Int J Eng Technol Innov 8(2):77–98

    Google Scholar 

  3. Al-Otum HM (2020) Secure and robust host-adapted color image watermarking using inter-layered wavelet-packets. J Vis Commun Image Represent 66:102726

    Article  Google Scholar 

  4. Ateniese G, Blundo C, De Santis A, Stinson DR (1996) Extended schemes for visual cryptography. Theor Comput Sci 250:1–16

    MATH  Google Scholar 

  5. C. V. G. at the University of Granada. http://decsai.ugr.es/cvg/dbimagenes/

  6. Candès EJ, Donoho DL (2004) New tight frames of curvelets and optimal representations of objects with piecewise c2 singularities. Commun Pure Appl Math J Issued Courant Inst Math Sci 57(2):219–266

    Article  Google Scholar 

  7. Chen T-H, Chang C-C, Wu C-S, Lou D-C (2009) On the security of a copyright protection scheme based on visual cryptography. Comput Stand Interface 31 (1):1–5

    Article  Google Scholar 

  8. database C http://vision.eng.shizuoka.ac.jp/mod/page/view.php?id=23

  9. Database U-SI http://sipi.usc.edu/database/database.php?volume=misc

  10. Devi BP, Singh KM, Roy S (2016) A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography. SpringerPlus 5(1):1091

    Article  Google Scholar 

  11. Fares K, Amine K, Salah E (2020) A robust blind color image watermarking based on fourier transform domain. Optik 208:164562

    Article  Google Scholar 

  12. Fatahbeygi A, Tab FA (2019) A highly robust and secure image watermarking based on classification and visual cryptography. J Inf Secur Appl 45:71–78

    Google Scholar 

  13. Hénon M (1976) A two-dimensional mapping with a strange attractor. In The Theory of Chaotic Attractors. Springer, pp 94–102

  14. Hou Y-C, Chen P-M (2000) An asymmetric watermarking scheme based on visual cryptography. In: 2000. WCCC-ICSP 2000. 5th International Conference on Signal Processing Proceedings, vol 2. IEEE, pp 992–995

  15. HOU YC, Tseng A-Y, Quan Z-Y, Liu H-J (2016) An ipr protection scheme based on wavelet transformation and visual cryptography. Turkish J Electr Eng Comput Sci 24(5):4063–4082

    Article  Google Scholar 

  16. Hsieh S-L, Hsu L-Y, Tsai I-J (2005) A copyright protection scheme for color images using secret sharing and wavelet transform. In: Proceedings of world academy of science, engineering and technology, vol 10

  17. Hsu C-S, Hou Y-C (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44(7):077003

    Article  Google Scholar 

  18. Hwang R-J (2000) A digital image copyright protection scheme based on visual cryptography. Tamkang J Sci Eng 3(2):97–106

    Google Scholar 

  19. Lou D-C, Tso H-K, Liu J-L (2007) A copyright protection scheme for digital images using visual cryptography technique. Compu Stand Interface 29(1):125–131

    Article  Google Scholar 

  20. Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the Theory and Application of of Cryptographic Techniques. Springer, pp 1–12

  21. Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9(1):62–66

    Article  Google Scholar 

  22. Rawat S, Raman B (2012) A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion. AEU-Int J Electron Commun 66 (11):955–962

    Article  Google Scholar 

  23. Roy S, Pal AK (2017) A blind dct based color watermarking algorithm for embedding multiple watermarks. AEU-Int J Electron Commun 72:149–161

    Article  Google Scholar 

  24. Shao Z, Shang Y, Zeng R, Shu H, Coatrieux G, Wu J (2016) Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Signal Process Image Commun 48:12–21

    Article  Google Scholar 

  25. Wang M-S, Chen W-C (2007) Digital image copyright protection scheme based on visual cryptography and singular value decomposition. Opt Eng 46(6):067006

    Article  Google Scholar 

  26. Xia Z, Wang X, Zhou W, Li R, Wang C, Zhang C (2019) Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms. Signal Process 157:108–118

    Article  Google Scholar 

  27. Xue M, Yuan C, Liu Z, Wang J (2019) Ssl: A novel image hashing technique using sift keypoints with saliency detection and lbp feature extraction against combinatorial manipulations. Security and Communication Networks

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sonal Kukreja.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kukreja, S., Kasana, G. & Kasana, S.S. Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography. Multimed Tools Appl 79, 26155–26179 (2020). https://doi.org/10.1007/s11042-020-09130-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09130-y

Keywords

Navigation