2007
DOI: 10.1117/1.2746906
|View full text |Cite
|
Sign up to set email alerts
|

Digital image copyright protection scheme based on visual cryptography and singular value decomposition

Abstract: A digital image copyright protection scheme based on visual cryptography ͑VC͒ and singular value decomposition ͑SVD͒ techniques is proposed. In the proposed scheme, a master share is first constructed by applying SVD to a host image. Then, the master share is used together with a secret image to construct an ownership share, according to a two-out-of-two VC scheme. The secret image for ownership identification can be revealed by stacking the master share, and the ownership share. The proposed scheme embeds the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
62
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(62 citation statements)
references
References 23 publications
(16 reference statements)
0
62
0
Order By: Relevance
“…Visual cryptography [13][14][15] is such one kind of lossless watermarking scheme which furnishes the requirement by utilizing the codebook concept to divide an image into several different sharing images and produce the same by stacking when a dispute for ownership arises.Visual cryptography serves as a good technique against tampering of digital media and proving its rightful ownership and gained much attention for researchers in recent years. Many watermarking schemes based on visual cryptography have already been proposed [19][20][21][22][23][24][25][26]. The basic idea is to generate two shares of the watermark…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Visual cryptography [13][14][15] is such one kind of lossless watermarking scheme which furnishes the requirement by utilizing the codebook concept to divide an image into several different sharing images and produce the same by stacking when a dispute for ownership arises.Visual cryptography serves as a good technique against tampering of digital media and proving its rightful ownership and gained much attention for researchers in recent years. Many watermarking schemes based on visual cryptography have already been proposed [19][20][21][22][23][24][25][26]. The basic idea is to generate two shares of the watermark…”
Section: Related Workmentioning
confidence: 99%
“…Other scheme comparing the global mean of the pixels values has been proposed in [22]. A most significant bit watermarking embedding (MWE) and pixel watermarking embedding (PWE) scheme has been proposed in [23][24][25].…”
Section: International Journal Of Computer Applications (0975 -8887)mentioning
confidence: 99%
“…The model of our scheme includes three kinds of participants (most VC-based watermarking schemes adopt similar models as to ours [2,4,7,9]): the owners of the cover images who want to protect their copyright of the cover images, the attackers who want to illegally use the cover images and a TA who will arbitrate the ownership of the cover images when a dispute occurs. Generally, we assume that, t owners own n images, and there is only one TA, where t and n are positive integers.…”
Section: Proposed Schemementioning
confidence: 99%
“…In recent years, a number of scholars [11][12][13][14][15][16][17][18] have begun to focus on image copyright protection based on a combination of the visual secret sharing (VSS) 19 and traditional watermarking techniques. In this scheme, a verification image, called ownership share, can be produced from the host image feature and watermark; then the ownership share is registered to a certified authority (CA).…”
Section: Introductionmentioning
confidence: 99%