Image Watermarking Using Visual Cryptography

2006 ◽  
pp. 337-338
2005 ◽  
Author(s):  
Z. Tifedjadjine ◽  
N. Atamna ◽  
Z. Dibi ◽  
A. Bouridane

2015 ◽  
Vol 7 (1) ◽  
pp. 51-68 ◽  
Author(s):  
Yuanfang Guo ◽  
Oscar C. Au ◽  
Ketan Tang

Error Diffusion has been widely adopted in the printing industry due to its good visual quality and simple implementation. However, error diffusion still possesses its own deficiencies. Thus multiscale error diffusion (MED) has been developed, and this method outperforms traditional error diffusion according to extensive research results. The majority of previous halftone image watermarking techniques cannot be directly applied to MED halftone images. Since there is no halftone visual watermarking (HVW) method for MED halftone images in existing methods, we propose the first HVW method for MED halftone images, Copyright Protecting Multiscale Error Diffusion (CoP-MED), in this paper. By adopting the visual cryptography principle, CoP-MED can effectively embed a secret pattern into two MED halftone images, where the secret pattern can be decoded clearly by simply overlaying the two stego halftone images or performing not-exclusive-or operation between them. Parameter selection is also discussed based on the experimental results. Later, in comparison tests, CoP-MED shows superior performance compared to existing works.


In today’s world, the enhancement in internet technologies, digital data are mostly used to share the information in public networks. There are many traditional security techniques used to provide security to the digital information. But the existing methods don’t provide much of the security to digital media like image, video, audio, etc. The digital watermarking is employed in the protection of digital information. This paper gives a review on digital image watermarking based on the visual cryptography to reach secure protection for the images. The secret information can be inserted in the original images. The secret key is generated from the watermark image with the help of visual cryptography to claim the ownership of images. Various types of Visual Cryptography and Digital Image Watermarking techniques are explained in real time application.


Author(s):  
Dr. Sheshang D. Degadwala ◽  
Sanjay Chaudhary ◽  
Sanjay Gaur ◽  
Dhairya Vyas

Watermarking is raised to apparatus for the Privacy of Intellectual Property Rights (IPR) of combination dates. In this paper, in the starting we have to fill the user name field and password field which will be secure afterwards that it will be make QR-code using zxing library and it is transformed into binary patterns for share-1 that is called Visual cryptography algorithm. Now share-2 is store into server database and it will be furthered use in future situation at receiver way. Now share-1 is hiding into the LL-Band with the help of DWT-SVD into block manner with Pseudo Zernike moment. Then it is sent to the network or internet. As in network there are many unlike attackers whose apply any Rotation, Scaling or Translation attacks on the hiding image. Attack image is expected at the end side or receiver side. To get prevent against attacks here at the starting stage use Pseudo Zernike moment then after Surf based feature extraction and it will recover the attacks pixel and scaling parameters value and using affine transformation recover the rotational parameters value. So then scale value and angle value is apply on attack image recovered watermark image. Now using DWT+SVD block method extract the water mark share-1. So on system with share-1 and another share-2 will be in server side so now by using EX-OR process for getting QR-Code. At the last stage QR-code is translated and fill field user name and password vale to login the system successfully.


2012 ◽  
Vol 41 (20) ◽  
pp. 1-5 ◽  
Author(s):  
Jaishri Chourasia ◽  
M. B. Potdar ◽  
Abdul Jhummarwala ◽  
Keyur Parmar

In this paper, a novel dual image watermarking method is proposed to provide the copyright protection to digital images. In this proposed method, the lower and higher frequency subbands of the decomposed original image are modified by inserting the watermark information using different transforms. The implementation of a method that combines the visual cryptography with dual image watermarking to provide the security for the digital images during an exchange in open networks. The Arnold transform is used to encrypt the second watermark to employ the secure communication. Based on the proposed, the perceptibility and robustness of the distributed images can be increased. The original and watermarked images look like same and the PSNR and NCC are calculated for analyzing the system performance. This method is more robust and secure than existing methods


Sign in / Sign up

Export Citation Format

Share Document