Halftone Image Watermarking based on Visual Cryptography
نویسندگان
چکیده
منابع مشابه
Halftone Image Watermarking based on Visual Cryptography
In this paper we have proposed digital watermarking scheme for halftone images based on visual cryptography scheme. The scheme does not embed the watermark directly on the halftone image instead watermark will be divided into the parts called as shares. The scheme not only protects the watermark but also provides an effective copyright protection scheme. At the time of watermark embedding verif...
متن کاملHalftone Visual Cryptography & Watermarking
R.Charanya, T. Vijayan Abstract: In this Paper, a method of Information hiding & Piracy protection in Image processing is discussed. Visual cryptography & Digital watermarking helps in enables Information hiding, copyright & piracy protection. Here, a technique involving halftone visual cryptography along with watermarking is proposed to achieve visual cryptography via half toning. Digital wate...
متن کاملNew Algorithm for Halftone Image Visual Cryptography
Visual secret sharing is the technique that divide the secret image into n multiple shares. Each share constitutes some information and when k shares out of n stack together the secret will reveal. However; less than k shares are not work. The beauty of the visual secret sharing scheme is its decryption process i.e. to decrypt the secret using Human Visual System (HVS) without any computation. ...
متن کاملHSV Image Watermarking Scheme Based on Visual Cryptography
In this paper a simple watermarking method for color images is proposed. The proposed method is based on watermark embedding for the histograms of the HSV planes using visual cryptography watermarking. The method has been proved to be robust for various image processing operations such as filtering, compression, additive noise, and various geometrical attacks such as rotation, scaling, cropping...
متن کاملA Digital Image Watermarking Scheme Based on Visual Cryptography
An image watermarking scheme based on the visual cryptography is proposed in this paper. The owner’s mark which can be a visible logo is split into two share-images using a visual secret sharing scheme. One of the shares is embedded into the host image whereas the other is kept as the system’s secret-key to be used in the watermark detection process. In case the inserted watermark is a visible ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2012
ISSN: 0975-8887
DOI: 10.5120/5805-8010