Book ChapterDOI
A multi-user based watermarking system with two-security-level keys
Feng-Hsing Wang,Lakhmi C. Jain,Jeng-Shyang Pan +2 more
- pp 40-50
Reads0
Chats0
TLDR
It will be analytically proven that the removal process plays role in reducing the interference between an original signal and a watermark to be embedded and improves the ability of the right detection.Abstract:
This paper presents a new watermarking scheme to reduce the detection error probability through removal of local mean values of an original signal. It will be analytically proven that the removal process plays role in reducing the interference between an original signal and a watermark to be embedded. This is simply based on the orthogonality of the DC signal and the AC signal. As a result, the process improves the ability of the right detection. The proposed method is analytically and empirically evaluated with no attack as well as JPEG compression attacks.read more
Citations
More filters
Journal ArticleDOI
Multiuser-based shadow watermark extraction system
TL;DR: A new watermarking scheme having the ability of sharing secret with multi-users is proposed, which splits the original watermark into two shares and embeds one share into the cover image to increase the security.
Proceedings ArticleDOI
Design of hierarchical keys for a multi-user-based watermarking system
TL;DR: For a multi-user-based watermarking system, a new scheme for providing the function of secret sharing is proposed and a user-key generating procedure is introduced to generate one master key and several normal keys.
Book ChapterDOI
Shadow watermark extraction system
TL;DR: A new watermarking scheme which provides the ability of sharing secret with multi-users is proposed, which splits the original watermark into two shares and embeds one share into the cover image to increase the security.
Journal ArticleDOI
Multi-watermarking scheme for group users based on Visual Cryptography
TL;DR: Analysis and experimental results show that the new watermarking method is novel, secure and robust.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Book
Digital Watermarking
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Visual Cryptography
Moni Naor,Adi Shamir +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Journal ArticleDOI
Image-adaptive watermarking using visual models
C.I. Podilchuk,Wenjun Zeng +1 more
TL;DR: This work proposes perceptually based watermarking schemes in two frameworks: the block-based discrete cosine transform and multiresolution wavelet framework and discusses the merits of each one, which are shown to provide very good results both in terms of image transparency and robustness.
Journal ArticleDOI
Hidden digital watermarks in images
Chiou-Ting Hsu,Ja-Ling Wu +1 more
TL;DR: The experimental results show that the proposed image authentication technique by embedding digital "watermarks" into images successfully survives image processing operations, image cropping, and the Joint Photographic Experts Group lossy compression.