{"title":"基于视觉密码的DWT域灰度图像水印","authors":"P. Kulkarni, Girish Kulkarni","doi":"10.1109/ICECA.2018.8474621","DOIUrl":null,"url":null,"abstract":"Watermarking is a technique to protect the copyrights of digital media like image, audio, video, etc. Visual Cryptography (VC) is a scheme for hiding information in still images. The Visual Cryptography Scheme splits the secret image into unintelligible images, these images are called shares. The shares are distributed to ‘n’ participants. Any ‘k’ shares out of ‘n’ reveal the secret image and less than ‘k’ shares recover no information about secret. Amalgamating Visual cryptography with watermarking yields the best solution for resolving image ownership disputes and detection of infringements of copyrights. In this paper, (2,2) VC scheme is employed, one of the shares is embedded in the low frequency domain of DWT and the other share is registered with the Trusted Authority(TA). The secret image is obtained by performing XOR operation on the two shares. The experimental results revealed that the proposed scheme can not only prove the ownership of image but also withstand various image processing attacks.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Visual Cryptography based Grayscale Image Watermarking in DWT domain\",\"authors\":\"P. Kulkarni, Girish Kulkarni\",\"doi\":\"10.1109/ICECA.2018.8474621\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Watermarking is a technique to protect the copyrights of digital media like image, audio, video, etc. Visual Cryptography (VC) is a scheme for hiding information in still images. The Visual Cryptography Scheme splits the secret image into unintelligible images, these images are called shares. The shares are distributed to ‘n’ participants. Any ‘k’ shares out of ‘n’ reveal the secret image and less than ‘k’ shares recover no information about secret. Amalgamating Visual cryptography with watermarking yields the best solution for resolving image ownership disputes and detection of infringements of copyrights. In this paper, (2,2) VC scheme is employed, one of the shares is embedded in the low frequency domain of DWT and the other share is registered with the Trusted Authority(TA). The secret image is obtained by performing XOR operation on the two shares. The experimental results revealed that the proposed scheme can not only prove the ownership of image but also withstand various image processing attacks.\",\"PeriodicalId\":272623,\"journal\":{\"name\":\"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-03-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECA.2018.8474621\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA.2018.8474621","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Visual Cryptography based Grayscale Image Watermarking in DWT domain
Watermarking is a technique to protect the copyrights of digital media like image, audio, video, etc. Visual Cryptography (VC) is a scheme for hiding information in still images. The Visual Cryptography Scheme splits the secret image into unintelligible images, these images are called shares. The shares are distributed to ‘n’ participants. Any ‘k’ shares out of ‘n’ reveal the secret image and less than ‘k’ shares recover no information about secret. Amalgamating Visual cryptography with watermarking yields the best solution for resolving image ownership disputes and detection of infringements of copyrights. In this paper, (2,2) VC scheme is employed, one of the shares is embedded in the low frequency domain of DWT and the other share is registered with the Trusted Authority(TA). The secret image is obtained by performing XOR operation on the two shares. The experimental results revealed that the proposed scheme can not only prove the ownership of image but also withstand various image processing attacks.