An image copyright protection scheme by encrypting secret data with the host image

被引:16
|
作者
Rani, Asha [1 ]
Raman, Balasubramanian [2 ]
机构
[1] IIT Roorkee, Dept Math, Roorkee 247667, Uttar Pradesh, India
[2] IIT Roorkee, Dept Comp Sci & Engn, Roorkee 247667, Uttar Pradesh, India
关键词
Digital watermarking; Discrete cosine transform; Singular-value decomposition; Zero-watermarking; Certified authority;
D O I
10.1007/s11042-014-2344-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a zero-watermarking based copyright protection scheme is proposed. The secret watermark image is not embedded in the host image rather it is encrypted with the host image. The proposed scheme is making use of discrete cosine transform and singular value decomposition to extract robust features of the host image. Further the selected robust features are used to encrypt the secret image. The secret image is encrypted with the host image by generating two shares namely master share and ownership share. The master share is generated by differential classification of features extracted. The ownership share is generated with the help of master share and the secret image. The two shares separately don't give any clue of the secret image but when stacked together the encrypted secret image is revealed. Experimental study is conducted to evaluate the robustness of the algorithm against various signal processing and geometrical attacks.
引用
收藏
页码:1027 / 1042
页数:16
相关论文
共 50 条
  • [1] An image copyright protection scheme by encrypting secret data with the host image
    Asha Rani
    Balasubramanian Raman
    Multimedia Tools and Applications, 2016, 75 : 1027 - 1042
  • [2] An RST-Resilient Image Copyright Protection Scheme Based on the Invariant Domain and Image Secret Sharing
    Hsieh, Shang-Lin
    Chen, Ding-Jie
    Huang, Bin-Yuan
    Tsai, I-Ju
    2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), VOLS 1-6, 2008, : 1058 - 1063
  • [3] An image watermarking scheme based on image visual activity for copyright protection
    Keissarian, Farhad
    2007 INNOVATIONS IN INFORMATION TECHNOLOGIES, VOLS 1 AND 2, 2007, : 507 - 511
  • [4] An image copyright protection scheme based on torus automorphism
    Chang, CC
    Hsiao, JY
    Chiang, CL
    FIRST INTERNATIONAL SYMPOSIUM ON CYBER WORLDS, PROCEEDINGS, 2002, : 217 - 224
  • [5] A novel edge based image copyright protection scheme
    Li, KF
    Chen, TS
    Cheng, SC
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON IMAGING SCIENCE, SYSTEMS AND TECHNOLOGY, VOLS I AND II, 2001, : 267 - 273
  • [6] A Multipurpose Watermarking Scheme for Image Authentication and Copyright Protection
    Zhu, Congxu
    Hu, Yuping
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 930 - +
  • [7] Image Watermarking With Biometric Data For Copyright Protection
    Barbier, Morgan
    Le Bars, Jean-Marie
    Rosenberger, Christophe
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 618 - 625
  • [8] A NOVEL WATERMARKING SCHEME FOR COPYRIGHT PROTECTION BASED ON ADAPTIVE JOINT IMAGE FEATURE AND VISUAL SECRET SHARING
    Fan, Li
    Gao, Tiegang
    Yang, Qunting
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (7A): : 3679 - 3694
  • [9] Image distribution method with identifier embedding scheme for copyright protection
    Abe, T
    Fujii, H
    Kushima, K
    Sakurai, N
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 2002, 85 (12): : 80 - 88
  • [10] On the implementation of a copyright protection scheme using digital image watermarking
    Roy, Subhrajit Sinha
    Basu, Abhishek
    Chattopadhyay, Avik
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) : 13125 - 13138