Abstract
In this paper, a new Visual Cryptography based watermarking scheme for multiple cover images is proposed. The proposed scheme conceals watermark without altering the original cover images. First, it extracts the feature shares by applying the discrete wavelet transform (DWT), Singular value decomposition (SVD), and scale invariant feature transform (SIFT) on the cover images. The extracted feature shares are then used together with the private key and watermark to construct a secret share. The secret share should be registered with a trust authority. When a dispute over cover images happens, watermark can be extracted by using private key, feature shares, and secret share. The experimental results showed the method robustness versus various attacks, especially rotation and scaling.
Similar content being viewed by others
References
Chang CC, Chung JC (2002) An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recogn Lett 23:931–941
Chang CC, Tsai PY, Lin MH (2005) SVD-based digital image watermarking scheme. Pattern Recogn Lett 26:1577–1586
Chen TH, Chang CC, Wu CS, Lou DC (2009) On the security of a copyright protection scheme based on visual cryptography. Comput Stand Interfaces 31:1–5
Horngm S, Rosiyadi D, Fan P, Wang X, Khurram Khan M, Pan Y (2012) An efficient copyright protection scheme for e-government document images. IEEE Multimedia 62–73
Hsieh SL, Huang BY (2004) A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation. Proceedings of International Computer Symposium, p 661–666
Hsu CS, Hou YC (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44:077003
Huang F, Guan ZH (2004) A hybrid SVD-DCT watermarking method based on LPSNR. Pattern Recogn Lett 25:1769–1775
Klema VC (1980) The singular value decomposition: its computation and some applications. IEEE Trans Autom Control 25:164–176
Lee JS, Wong HS, Wang YH (2014) Variation-free watermarking technique based on scale relationship. Computer science and information technology (CS & IT), p 225–239
Lin WH, Horng SJ, Kao TW, Chen RJ, Chen YH, Lee CL, Terano T (2009) Image copyright protection with forward error correction. Expert Systems with Applications, p 11888–11894
Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 746–757
Lin Y-T, Huang C-Y, Lee GC (2011) Rotation, scaling, and translation resilient watermarking for images. IET Image Process 5(4):328–340
Lin WH, Wang YR, Horng SJ (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Systems with Applications, p 9869–9878
Liu F, Wu C-K (2011) Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners. IET J 121–128
Liu F, Wu CK, Lin XJ (2009) Some extensions on threshold visual cryptography schemes. Comput J 107–119
Lou DC, Tso HK, Liu JL (2007) A copyright protection scheme for digital images using visual cryptography technique. Comput Stand Interfaces 29:125–131
Lowe DG (2004) Distinctive image features from scale-invariant keypoints’. Int J Comput Vis 60(2):91–110
Naor M, Shamir A (1995) Visual cryptography. Proceedings of Advances in Cryptology EUROCRYPT94, LNCS 950, p 1–12
Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Signal Process 66:385–403
Pitas I (1996) A method for signature casting on digital images. Proceedings of IEEE International Conference on Image Processing, p 215–318
Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Process 1480–1491
Shieh JM, Lou DC, Chang MC (2006) A semi-blind digital watermarking scheme based on singular value decomposition. Comput Stand Interfaces 28:428–440
Tuyls P, Hollmann HDL, vanLint JH, Tolhuizen L (2005) Xor-based visual cryptography schemes. Des Codes Crypt 37:169–186
Van Schyndel RG, Tirkel AZ, Osborne CF (1994) A digital watermark. Proceedings of IEEE International Conference on Image Processing, p 86–90
Wang MS, Chen WC (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Comput Stand Interfaces 31:757–762
Wang CC, Tai SC, Yu CS (2000) Repeating image watermarking technique by the visual cryptography. IEICE Trans Fundam E83-A:1589–1598
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Amiri, T., Moghaddam, M.E. A new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover images. Multimed Tools Appl 75, 8527–8543 (2016). https://doi.org/10.1007/s11042-015-2770-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2770-7