A Visual Cryptography Based Digital Image Copyright Protection
نویسنده
چکیده
A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image.
منابع مشابه
A Novel Patch-Based Digital Signature
In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...
متن کاملA Visual Cryptography and Statistics Based Method for Ownership Identification of Digital Images
In this paper, a novel copyright protection scheme for digital images based on Visual Cryptography and Statistics is proposed. In our scheme, the theories and properties of sampling distribution of means and visual cryptography are employed to achieve the requirements of robustness and security. Our method does not need to alter the original image and can identify the ownership without resortin...
متن کاملA Novel Copyright Protection Scheme Using Visual Cryptography
Visual cryptography scheme is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. In this article, we propose a novel scheme for copyright protection for digital images based on visual cryptography. The proposed method employs encoding of Most Significant bits of ho...
متن کاملMultiple Watermarking Techniques using Visual Cryptography for Secured Copyright Protection
Copyright Protection has become a need in today’s world. To achieve a secure copyright protection we embedded information in images and videos and that image or video is called copyright protected. In this paper, a new robust watermarking technique for copyright protection based on Discrete Wavelet Transform and Singular Value Decomposition is proposed. The high frequency subband of the wavelet...
متن کاملA Review Paper on an Embedded Extended Visual Cryptography Scheme for Color Image Using Lpg with Pca
A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography using LPG with PCA. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels.In today’s scenario protection of digital data is utmost necessary in every part of life. More...
متن کاملHalftone Visual Cryptography & Watermarking
R.Charanya, T. Vijayan Abstract: In this Paper, a method of Information hiding & Piracy protection in Image processing is discussed. Visual cryptography & Digital watermarking helps in enables Information hiding, copyright & piracy protection. Here, a technique involving halftone visual cryptography along with watermarking is proposed to achieve visual cryptography via half toning. Digital wate...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Information Security
دوره 3 شماره
صفحات -
تاریخ انتشار 2012