scispace - formally typeset
Book ChapterDOI

A multi-user based watermarking system with two-security-level keys

Reads0
Chats0
TLDR
It will be analytically proven that the removal process plays role in reducing the interference between an original signal and a watermark to be embedded and improves the ability of the right detection.
Abstract
This paper presents a new watermarking scheme to reduce the detection error probability through removal of local mean values of an original signal. It will be analytically proven that the removal process plays role in reducing the interference between an original signal and a watermark to be embedded. This is simply based on the orthogonality of the DC signal and the AC signal. As a result, the process improves the ability of the right detection. The proposed method is analytically and empirically evaluated with no attack as well as JPEG compression attacks.

read more

Citations
More filters
Journal ArticleDOI

Multiuser-based shadow watermark extraction system

TL;DR: A new watermarking scheme having the ability of sharing secret with multi-users is proposed, which splits the original watermark into two shares and embeds one share into the cover image to increase the security.
Proceedings ArticleDOI

Design of hierarchical keys for a multi-user-based watermarking system

TL;DR: For a multi-user-based watermarking system, a new scheme for providing the function of secret sharing is proposed and a user-key generating procedure is introduced to generate one master key and several normal keys.
Book ChapterDOI

Shadow watermark extraction system

TL;DR: A new watermarking scheme which provides the ability of sharing secret with multi-users is proposed, which splits the original watermark into two shares and embeds one share into the cover image to increase the security.
Journal ArticleDOI

Multi-watermarking scheme for group users based on Visual Cryptography

TL;DR: Analysis and experimental results show that the new watermarking method is novel, secure and robust.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Book

Digital Watermarking

TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.

Visual Cryptography

Moni Naor, +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Journal ArticleDOI

Image-adaptive watermarking using visual models

TL;DR: This work proposes perceptually based watermarking schemes in two frameworks: the block-based discrete cosine transform and multiresolution wavelet framework and discusses the merits of each one, which are shown to provide very good results both in terms of image transparency and robustness.
Journal ArticleDOI

Hidden digital watermarks in images

TL;DR: The experimental results show that the proposed image authentication technique by embedding digital "watermarks" into images successfully survives image processing operations, image cropping, and the Joint Photographic Experts Group lossy compression.
Related Papers (5)