An image copyright protection scheme by encrypting secret data with the host image

被引:16
|
作者
Rani, Asha [1 ]
Raman, Balasubramanian [2 ]
机构
[1] IIT Roorkee, Dept Math, Roorkee 247667, Uttar Pradesh, India
[2] IIT Roorkee, Dept Comp Sci & Engn, Roorkee 247667, Uttar Pradesh, India
关键词
Digital watermarking; Discrete cosine transform; Singular-value decomposition; Zero-watermarking; Certified authority;
D O I
10.1007/s11042-014-2344-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a zero-watermarking based copyright protection scheme is proposed. The secret watermark image is not embedded in the host image rather it is encrypted with the host image. The proposed scheme is making use of discrete cosine transform and singular value decomposition to extract robust features of the host image. Further the selected robust features are used to encrypt the secret image. The secret image is encrypted with the host image by generating two shares namely master share and ownership share. The master share is generated by differential classification of features extracted. The ownership share is generated with the help of master share and the secret image. The two shares separately don't give any clue of the secret image but when stacked together the encrypted secret image is revealed. Experimental study is conducted to evaluate the robustness of the algorithm against various signal processing and geometrical attacks.
引用
收藏
页码:1027 / 1042
页数:16
相关论文
共 50 条
  • [31] Copyright protection scheme based on chaos and secret sharing techniques
    Lou, DC
    Shieh, JM
    Tso, HK
    OPTICAL ENGINEERING, 2005, 44 (11)
  • [32] A Novel Copyright Protection Scheme based on Visual Secret Sharing
    Surekha, B.
    Swamy, G. N.
    Reddy, K. Rama Linga
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [33] Image watermarking for copyright protection and data hiding via the Mojette transform
    Autrusseau, F
    Guédon, J
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 378 - 386
  • [34] Medical Image Watermarking Based on Visual Secret Sharing and Cellular Automata Transform for Copyright Protection
    Fan, Tzuo-Yau
    Chao, Her-Chang
    Chien, Bin-Chang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (12): : 6177 - 6200
  • [35] PRIVACY PROTECTION FOR SOCIAL MEDIA BASED ON A HIERARCHICAL SECRET IMAGE SHARING SCHEME
    Beugnon, Sebastien
    Puteaux, Pauline
    Puech, William
    2019 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2019, : 679 - 683
  • [36] A Consumer-Oriented Image Transformation Scheme With a Secret Key for Privacy Protection
    Zhao, Ruoyu
    Wen, Wenying
    Zhu, Youwen
    Lan, Rushi
    IEEE SIGNAL PROCESSING LETTERS, 2024, 31 : 2280 - 2284
  • [37] Secret Image Transmission Scheme Using Secret Codebook
    Shie, Shih-Chieh
    Jiang, Ji-Han
    Chen, Long-Tai
    Huang, Zeng-Hui
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (02) : 399 - 402
  • [38] AN IMPROVED SCHEME FOR SECRET IMAGE SHARING
    Alharthi, Saeed
    Atrey, Pradeep K.
    2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010), 2010, : 1661 - 1666
  • [39] A secret sharing scheme for image encryption
    Lukac, R
    Plataniotis, KN
    PROCEEDINGS ELMAR-2004: 46TH INTERNATIONAL SYMPOSIUM ELECTRONICS IN MARINE, 2004, : 549 - 554
  • [40] Essential Secret Image Sharing Scheme
    Chen, Chien-chang
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 471 - 474