A Secure Image Watermarking Using Visual Cryptography and Discrete Fractional Fourier Transform

Article Preview

Abstract:

In this paper we proposed a secure image watermarking algorithm for digital image using the visual cryptography (VC) and discrete fractional Fourier transform (DFRFT). We use the visual secret sharing scheme to construct two shares, namely, master share and ownership share. Features of the original image are extracted using Non-Negative Matrix Factorization (NMF), and are used to generate the master share. Ownership share is generated with the help of secret image (watermark) and the master share, using VC technique. In case of any dispute, the master shares and ownership shares can be stacked together to give the copyright image verifying the ownership about the host image. In order to achieve the robustness and security, the properties of VC, DFRFT and NMF are used in our scheme. The experimental results show that the proposed scheme is strong enough to resist various signal processing operations.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

754-757

Citation:

Online since:

July 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Kim, J., Kim, N., Lee, D., Park, S., Lee, S.: Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents. Signal Process. Image Communed. 25 (2010) 559–576.

DOI: 10.1016/j.image.2010.07.004

Google Scholar

[2] F. Huang, Z.H. Guan, A hybrid SVD-DCT watermarking method based on LPSNR, Pattern Recognition Letters 25 (2004) 1769–1775.

DOI: 10.1016/j.patrec.2004.07.003

Google Scholar

[3] D. Kundur, D. Hatzinakos, Towards robust logo watermarking using multiresolution image fusion, IEEE Transactions on Multimedia 6 (2004) 185–197.

DOI: 10.1109/tmm.2003.819747

Google Scholar

[4] N.K. Nishchal, Optical image watermarking using fractional Fourier transform, Journal of Optics 38 (1) (2009) 22–28.

DOI: 10.1007/s12596-009-0003-z

Google Scholar

[5] Guo, J., Liu, Z., Liu, S.: Watermarking based on discrete fractional random transform. Opt. Commun. 272(2) (2007) 344–348.

DOI: 10.1016/j.optcom.2006.11.034

Google Scholar

[6] M. Naor, A. Shamir, Visual cryptography, in: Proceedings of the Advances in Cryptology EUROCRYPT'94, Lecture Notes in Computer Science, vol. 950, Springer-Verlag (1995) 1–12.

DOI: 10.1007/bfb0053419

Google Scholar

[7] C.C. Wang, S.C. Tai, C.S. Yu, Repeating image watermarking technique by the visual cryptography, IEICE Transactions on Fundamentals E83-A (2000) 1589–1598.

Google Scholar

[8] Y.C. Hou, P.M. Chen, An asymmetric watermarking scheme based on visual cryptography, in: Proceedings of the 5th Signal Processing Conference, vol. 2 (2000) 992–995.

DOI: 10.1109/icosp.2000.891692

Google Scholar

[9] C.C. Chang, J.C. Chung, An image intellectual property protection scheme for gray level images using visual secret sharing strategy, Pattern Recognition Letters 23 (2002) 931–941.

DOI: 10.1016/s0167-8655(02)00023-5

Google Scholar

[10] C.S. Hsu, Y.C. Hou, Copyright protection scheme for digital images using visual cryptography and sampling methods, Optical Engineering 44 (2005) 077003.

DOI: 10.1117/1.1951647

Google Scholar

[11] D. Cui, Dual digital watermarking algorithm for image based on fractional Fourier transform, in: Proceedings of Second Pacific–Asia Conference on Web Mining and Web Based Applications, Wuhan (2009) 51–54.

DOI: 10.1109/wmwa.2009.60

Google Scholar