确定有意义股份数的水印方案性能评价

J. Saturwar, D. Chaudhari
{"title":"确定有意义股份数的水印方案性能评价","authors":"J. Saturwar, D. Chaudhari","doi":"10.21013/JTE.ICSESD201709","DOIUrl":null,"url":null,"abstract":"With the growth in digital world, it is becoming more important to find a method to protect the security of digital media. An image watermarking model based on visual secret sharing (VSS) is proposed for protection of ownership. In the embedding phase, the watermark is first divided by VSS into two parts, a hiding watermark and a secret watermark. Then only the hiding watermark is embedded into the original image and the secret watermark is reserved for watermark extracting by the owner. In the extracting phase, the hiding watermark is extracted from the watermarked image first and then directly superimposed on the secret watermark to recover the watermark information. Digital watermarking has been proposed as a possible brick of such protection systems. However, application of watermarking for multimedia content protection in realistic scenarios poses several security issues. A digital watermarking technique is used to generate meaningful shares. The secret image shares are watermarked with different cover images and are transmitted. At the receiving side, the cover images are extracted from the shares and stacked one by one which reveals the secret image progressively. Digital watermarking using visual cryptography provides improved security for encrypting secret images.","PeriodicalId":269688,"journal":{"name":"IRA-International Journal of Technology & Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Performance Evaluation of watermarking Schemes to Decide Meaningful Number of Shares\",\"authors\":\"J. Saturwar, D. Chaudhari\",\"doi\":\"10.21013/JTE.ICSESD201709\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the growth in digital world, it is becoming more important to find a method to protect the security of digital media. An image watermarking model based on visual secret sharing (VSS) is proposed for protection of ownership. In the embedding phase, the watermark is first divided by VSS into two parts, a hiding watermark and a secret watermark. Then only the hiding watermark is embedded into the original image and the secret watermark is reserved for watermark extracting by the owner. In the extracting phase, the hiding watermark is extracted from the watermarked image first and then directly superimposed on the secret watermark to recover the watermark information. Digital watermarking has been proposed as a possible brick of such protection systems. However, application of watermarking for multimedia content protection in realistic scenarios poses several security issues. A digital watermarking technique is used to generate meaningful shares. The secret image shares are watermarked with different cover images and are transmitted. At the receiving side, the cover images are extracted from the shares and stacked one by one which reveals the secret image progressively. Digital watermarking using visual cryptography provides improved security for encrypting secret images.\",\"PeriodicalId\":269688,\"journal\":{\"name\":\"IRA-International Journal of Technology & Engineering\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IRA-International Journal of Technology & Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21013/JTE.ICSESD201709\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IRA-International Journal of Technology & Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21013/JTE.ICSESD201709","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

随着数字世界的发展,寻找一种保护数字媒体安全的方法变得越来越重要。为了保护所有权,提出了一种基于视觉秘密共享(VSS)的图像水印模型。在嵌入阶段,VSS首先将水印分割为隐藏水印和秘密水印两部分。然后在原始图像中只嵌入隐藏水印,保留秘密水印供所有者进行水印提取。在提取阶段,首先从水印图像中提取隐藏水印,然后直接叠加在秘密水印上,恢复水印信息。数字水印已被提出作为这种保护系统的可能组成部分。然而,在现实场景中,将水印技术应用于多媒体内容的保护,会产生一些安全问题。采用数字水印技术生成有意义的共享。秘密图像共享用不同的封面图像进行水印并传输。在接收端,从共享中提取封面图像并逐个堆叠,逐步揭示秘密图像。使用视觉加密技术的数字水印为加密机密图像提供了更高的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Performance Evaluation of watermarking Schemes to Decide Meaningful Number of Shares
With the growth in digital world, it is becoming more important to find a method to protect the security of digital media. An image watermarking model based on visual secret sharing (VSS) is proposed for protection of ownership. In the embedding phase, the watermark is first divided by VSS into two parts, a hiding watermark and a secret watermark. Then only the hiding watermark is embedded into the original image and the secret watermark is reserved for watermark extracting by the owner. In the extracting phase, the hiding watermark is extracted from the watermarked image first and then directly superimposed on the secret watermark to recover the watermark information. Digital watermarking has been proposed as a possible brick of such protection systems. However, application of watermarking for multimedia content protection in realistic scenarios poses several security issues. A digital watermarking technique is used to generate meaningful shares. The secret image shares are watermarked with different cover images and are transmitted. At the receiving side, the cover images are extracted from the shares and stacked one by one which reveals the secret image progressively. Digital watermarking using visual cryptography provides improved security for encrypting secret images.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信