scispace - formally typeset
Open AccessDOI

A Digital Image Copyright Protection Scheme Based on Visual Cryptography

Ren-Junn Hwang
- Vol. 3, Iss: 2, pp 97-106
Reads0
Chats0
TLDR
The proposed watermark method is built up on the concept of visual cryptography and shows that the watermark pattern in the marked image has good transparency and robustness.

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

A comprehensive study of visual cryptography

TL;DR: The latest developments of visual cryptography since its inception in 1994 are summarized, the main research topics in this area are introduced and the current problems and possible solutions are outlined.
Journal ArticleDOI

Copyright protection scheme for digital images using visual cryptography and sampling methods

TL;DR: A novel copyright protection scheme for digital images based on visual cryptography and statistics is proposed that can register multiple secret images without altering the host image and can identify the rightful ownership without resorting to the original image.
Journal ArticleDOI

Robust copyright protection scheme for digital images using overlapping DCT and SVD

TL;DR: A robust lossless copyright protection scheme, based on overlapping discrete cosine transform (DCT) and singular value decomposition (SVD), is presented, demonstrating the robustness of the proposed scheme against different image-manipulation attacks.
Journal ArticleDOI

Video watermarking scheme based on visual cryptography and scene change detection

TL;DR: A novel video watermarking scheme based on visual cryptography and scene change detection in discrete wavelet transform domain is proposed, which can reveal the copyright ownership of the owner's share from the original video based on the frame mean in same scene and the binary watermark.
Journal Article

Sensitive Digital Image Watermarking for Copyright Protection

TL;DR: The simulation results reveal that the proposed watermark hiding scheme has good robustness to a range of image processing attacks and aims at improving the security of the related schemes.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.

Visual Cryptography

Moni Naor, +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Journal ArticleDOI

Hidden digital watermarks in images

TL;DR: The experimental results show that the proposed image authentication technique by embedding digital "watermarks" into images successfully survives image processing operations, image cropping, and the Joint Photographic Experts Group lossy compression.
Proceedings ArticleDOI

A multiresolution watermark for digital images

TL;DR: A new multiresolution watermarking method based on the discrete wavelet transform (DWT), where Pseudo-random codes are added to the large coefficients at the high and middle frequency bands of the DWT of an image.
Related Papers (5)