Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners

Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Watermarking is a technique to protect the copyright of digital media such as image, text, music and movie. In this study, a robust watermarking scheme for multiple cover images and multiple owners is proposed. The proposed scheme makes use of the visual cryptography (VC) technique, transform domain technique, chaos technique, noise reduction technique and error correcting code technique where the VC technique provides the capability to protect the copyright of multiple cover images for multiple owners, and the rest of the techniques are applied to enhance the robustness of the scheme.

References

    1. 1)
    2. 2)
      • Hsieh, S.L., Huang, B.Y.: `A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation', Proc. Int. Computer Symp., 2004, p. 661–666.
    3. 3)
      • Hsieh, S.L., Hsu, L.Y., Tsai, I.J.: `A copyright protection scheme for color images using secret sharing and wavelet transformation', Proc. World Academy of Science, Engineering and Technology, 2005, 10, p. 1307–6884.
    4. 4)
    5. 5)
      • M. Naor , A. Shamir . Visual cryptography.
    6. 6)
    7. 7)
      • Hou, Y.C., Chen, P.M.: `An asymmetric watermarking scheme based on visual cryptography', Proc. Fifth IEEE Int. Conf. on Signal Processing, 2000, p. 992–995.
    8. 8)
    9. 9)
    10. 10)
    11. 11)
    12. 12)
    13. 13)
    14. 14)
    15. 15)
    16. 16)
      • Tai, G.C., Chang, L.W.: `Visual cryptography for digital watermarking in still images', Proc. Fifth Pacific Rim Conf. on Multimedia, 2004, Tokyo, Japan, p. 50–57, (LNCS, 3332).
    17. 17)
    18. 18)
    19. 19)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2009.0183
Loading

Related content

content/journals/10.1049/iet-ifs.2009.0183
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address