scispace - formally typeset
Book ChapterDOI

Cryptanalysis on Digital Image Watermarking Based on Feature Extraction and Visual Cryptography

Reads0
Chats0
TLDR
This paper presents the cryptanalysis on a method that uses the visual cryptography and feature extraction for watermarking in images that allows the attacker to use his own valid watermark to be introduced to the image, which will result in failure of the owner to prove its copyright.
Abstract
This paper presents the cryptanalysis on a method that uses the visual cryptography and feature extraction for watermarking in images. Many of the existing digital watermarking techniques use a method which does not involve embedding of the watermark into the vulnerable images, but rather it only uses the features of image as the security key for generating watermark. This is assisted with the visual cryptography which makes it possible to perform watermarking without embedding any data onto it. Although they perform very well with many different attacks like scaling, rotating, compression, different kind of noises, etc., it still fails to prove the copyrights of image when the attack as illustrated in the paper is applied to the watermarked image. This method allows the attacker to use his own valid watermark to be introduced to the image, which will result in failure of the owner to prove its copyright.

read more

Citations
More filters
Book ChapterDOI

A Stealth Key Exchange Protocol

TL;DR: This research endeavor has proposed a novel stealth key-exchange solution, which makes use of interactive computer-mediated technologies, cryptography, and steganography and adlibs the Diffie-Hellman key exchange algorithm by disregarding the direct routing of any data relating to key exchange, and hence protects it from man-in-the-middle attack by keeping intact the anonymity of communicators.
Journal ArticleDOI

An NGram-Based Copyright Protection for Digital Images

Azzam Sleit, +1 more
TL;DR: Experimental results show the effectiveness of the proposed NGram-based approach in terms of the ability to recover the watermark pattern from the marked digital image even if major changes are applied to the original digital image.
Journal ArticleDOI

Video Identification Based on Watermarking Schemes and Visual Cryptography

TL;DR: In this paper , a watermarking algorithm is presented to achieve the owner's copy right security based on visual cryptography, and a common share, referred to as a smart key, can decrypt several images simultaneously.
References
More filters

Visual Cryptography

Moni Naor, +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Journal ArticleDOI

Cryptanalysis of the Yeung–Mintzer fragile watermarking technique

TL;DR: The security of the Yeung–Mintzer authentication watermarking technique is examined and it is shown that it is vulnerable to different types of impersonation and substitution attacks whereby an attacker is able to either create or modify images that would be considered authentic.
Journal ArticleDOI

Copyright protection scheme for digital images using visual cryptography and sampling methods

TL;DR: A novel copyright protection scheme for digital images based on visual cryptography and statistics is proposed that can register multiple secret images without altering the host image and can identify the rightful ownership without resorting to the original image.

A Digital Image Copyright Protection Scheme Based on Visual Cryptography

TL;DR: The proposed watermark method is built up on the concept of visual cryptography and shows that the watermark pattern in the marked image has good transparency and robustness.
Journal ArticleDOI

Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography

TL;DR: A novel robust watermarking scheme for copyright protection of color image based on quaternion-type moment invariants and visual cryptography that can deal with the multichannel information in a holistic way is introduced.