Halftone image watermarking based on visual cryptography

Author(s):  
Z. Tifedjadjine ◽  
N. Atamna ◽  
Z. Dibi ◽  
A. Bouridane
2015 ◽  
Vol 7 (1) ◽  
pp. 51-68 ◽  
Author(s):  
Yuanfang Guo ◽  
Oscar C. Au ◽  
Ketan Tang

Error Diffusion has been widely adopted in the printing industry due to its good visual quality and simple implementation. However, error diffusion still possesses its own deficiencies. Thus multiscale error diffusion (MED) has been developed, and this method outperforms traditional error diffusion according to extensive research results. The majority of previous halftone image watermarking techniques cannot be directly applied to MED halftone images. Since there is no halftone visual watermarking (HVW) method for MED halftone images in existing methods, we propose the first HVW method for MED halftone images, Copyright Protecting Multiscale Error Diffusion (CoP-MED), in this paper. By adopting the visual cryptography principle, CoP-MED can effectively embed a secret pattern into two MED halftone images, where the secret pattern can be decoded clearly by simply overlaying the two stego halftone images or performing not-exclusive-or operation between them. Parameter selection is also discussed based on the experimental results. Later, in comparison tests, CoP-MED shows superior performance compared to existing works.


2012 ◽  
Vol 41 (20) ◽  
pp. 1-5 ◽  
Author(s):  
Jaishri Chourasia ◽  
M. B. Potdar ◽  
Abdul Jhummarwala ◽  
Keyur Parmar

Biometrics ◽  
2017 ◽  
pp. 137-156
Author(s):  
Yuanfang Guo ◽  
Oscar C. Au ◽  
Ketan Tang

Error Diffusion has been widely adopted in the printing industry due to its good visual quality and simple implementation. However, error diffusion still possesses its own deficiencies. Thus multiscale error diffusion (MED) has been developed, and this method outperforms traditional error diffusion according to extensive research results. The majority of previous halftone image watermarking techniques cannot be directly applied to MED halftone images. Since there is no halftone visual watermarking (HVW) method for MED halftone images in existing methods, we propose the first HVW method for MED halftone images, Copyright Protecting Multiscale Error Diffusion (CoP-MED), in this paper. By adopting the visual cryptography principle, CoP-MED can effectively embed a secret pattern into two MED halftone images, where the secret pattern can be decoded clearly by simply overlaying the two stego halftone images or performing not-exclusive-or operation between them. Parameter selection is also discussed based on the experimental results. Later, in comparison tests, CoP-MED shows superior performance compared to existing works.


2013 ◽  
Vol 416-417 ◽  
pp. 1210-1213
Author(s):  
Hua Wen Ai ◽  
Ping Feng Liu ◽  
Sheng Cong Dong

In order to resist print and scan attacks, a kind of digital halftone image watermarking algorithm is proposed, which is based on the edge detection and improved error diffusion. The edge of gray image is gotten using canny detection. Calculate the noise visibility function values of the edge points. Then, sort the values in ascending order and select the size that equal to the length of watermark as the location of watermark embedding. While the grayscale image turns to halftone image using the improved error diffusion algorithm, binary watermark is embedded in the edge position. Watermark is pretreated with Arnold before embedding to improve the safety of watermark. Experiment results show that the algorithm is good resistance to print and scan attacks, while resistance to shearing, noise and jpeg compression attacks.


Author(s):  
Qifeng Chen ◽  
Guangxue Chen ◽  
Shuangshuang Wen ◽  
Jinglei Tai

In today’s world, the enhancement in internet technologies, digital data are mostly used to share the information in public networks. There are many traditional security techniques used to provide security to the digital information. But the existing methods don’t provide much of the security to digital media like image, video, audio, etc. The digital watermarking is employed in the protection of digital information. This paper gives a review on digital image watermarking based on the visual cryptography to reach secure protection for the images. The secret information can be inserted in the original images. The secret key is generated from the watermark image with the help of visual cryptography to claim the ownership of images. Various types of Visual Cryptography and Digital Image Watermarking techniques are explained in real time application.


Author(s):  
Dr. Sheshang D. Degadwala ◽  
Sanjay Chaudhary ◽  
Sanjay Gaur ◽  
Dhairya Vyas

Watermarking is raised to apparatus for the Privacy of Intellectual Property Rights (IPR) of combination dates. In this paper, in the starting we have to fill the user name field and password field which will be secure afterwards that it will be make QR-code using zxing library and it is transformed into binary patterns for share-1 that is called Visual cryptography algorithm. Now share-2 is store into server database and it will be furthered use in future situation at receiver way. Now share-1 is hiding into the LL-Band with the help of DWT-SVD into block manner with Pseudo Zernike moment. Then it is sent to the network or internet. As in network there are many unlike attackers whose apply any Rotation, Scaling or Translation attacks on the hiding image. Attack image is expected at the end side or receiver side. To get prevent against attacks here at the starting stage use Pseudo Zernike moment then after Surf based feature extraction and it will recover the attacks pixel and scaling parameters value and using affine transformation recover the rotational parameters value. So then scale value and angle value is apply on attack image recovered watermark image. Now using DWT+SVD block method extract the water mark share-1. So on system with share-1 and another share-2 will be in server side so now by using EX-OR process for getting QR-Code. At the last stage QR-code is translated and fill field user name and password vale to login the system successfully.


Sign in / Sign up

Export Citation Format

Share Document