scispace - formally typeset
Open AccessJournal ArticleDOI

Video Identification Based on Watermarking Schemes and Visual Cryptography

- Vol. 40, Iss: 2, pp 441-453
Reads0
Chats0
TLDR
In this paper , a watermarking algorithm is presented to achieve the owner's copy right security based on visual cryptography, and a common share, referred to as a smart key, can decrypt several images simultaneously.
Abstract
Related to the growth of data sharing on the Internet and the wide - spread use of digital media, multimedia security and copyright protection have become of broad interest. Visual cryptography () is a method of sharing a secret image between a group of participants, where certain groups of participants are defined as qualified and may combine their share of the image to obtain the original, and certain other groups are defined as prohibited, and even if they combine knowledge of their parts, they can’t obtain any information on the secret image. The visual cryptography is one of the techniques which used to transmit the secrete image under the cover picture. Human vision systems are connected to visual cryptography. The black and white image was originally used as a hidden image. In order to achieve the owner’s copy right security based on visual cryptography, a watermarking algorithm is presented. We suggest an approach in this paper to hide multiple images in video by meaningful shares using one binary share. With a common share, which we refer to as a smart key, we can decrypt several images simultaneously. Depending on a given share, the smart key decrypts several hidden images. The smart key is printed on transparency and the shares are involved in video and decryption is performed by physically superimposing the transparency on the video. Using binary, grayscale, and color images, we test the proposed method.

read more

References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

Color image encryption using spatial bit-level permutation and high-dimension chaotic system

TL;DR: A bit-level permutation and high-dimension chaotic map to encrypt color image and security analysis show that the scheme can achieve good encryption result, but also that the key space is large enough to resist against common attack.
Journal ArticleDOI

Shadow art

TL;DR: A geometric optimization is presented that computes a 3D shadow volume whose shadows best approximate the provided input images and can be modified with a set of interactive editing tools that automatically respect the often intricate shadow constraints.
Journal ArticleDOI

Improved Visual Secret Sharing Scheme for QR Code Applications

TL;DR: This paper proposes a visual secret sharing scheme to encode a secret QR code into several shares that can be decoded with some specific meaning by a standard QR code reader, thereby avoiding raising suspicion in potential attackers.
Journal ArticleDOI

Visual cryptography in single-pixel imaging.

TL;DR: In this article, two novel visual cryptography (VC) schemes are proposed by combining VC with single-pixel imaging (SPI) for the first time, which is pointed out that the overlapping of visual key images in VC is similar to the superposition of pixel intensities by a singlepixel detector in SPI.
Related Papers (5)