An image intellectual property protection scheme for gray-level images using visual secret sharing strategy

被引:107
作者
Chang, CC [1 ]
Chuang, JC [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
torus automorphism; visual cryptography; watermarking; discrete cosine transformation; verification;
D O I
10.1016/S0167-8655(02)00023-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we describe an image protection method for image intellectual property. The concept of this paper is based on the visual secret sharing scheme. We use the visual secret sharing scheme to construct two shares (also called transparencies). One share is generated from the host image, and the other share is arbitrarily generated by the owner. When the owner needs to be identified, we can superimpose these two shares to recover the secret information in order to validate the ownership. Our method has three advantages. The first advantage is simple computation, which means that our method does not use any complex computations such as discrete cosine transformation (DCT), and thus our method can be executed efficiently. The second advantage is that our method does not change any pixels of the host image. The third advantage is that our method is secure and robust. From the experimental results, our method can tolerate several image attacks, e.g., blurring, cropping, sharpening, JPEG lossy compression, etc. (C) 2002 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:931 / 941
页数:11
相关论文
共 9 条
[1]  
CHANG CC, 1998, COMPUTER PROCESSING, V12, P237
[2]  
HOU CY, 2000, P 5 SIGN PROC C, V2, P992
[3]   Hidden digital watermarks in images [J].
Hsu, CT ;
Wu, JL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) :58-68
[4]  
Hwang RJ, 1999, J INF SCI ENG, V15, P691
[5]   Hiding a picture in two pictures [J].
Hwang, RJ ;
Chang, CC .
OPTICAL ENGINEERING, 2001, 40 (03) :342-351
[6]   Wavelet based watermarking method for digital images using the human visual system [J].
Kim, YS ;
Kwon, OH ;
Park, RH .
ELECTRONICS LETTERS, 1999, 35 (06) :466-468
[7]   Digital watermarking for telltale tamper proofing and authentication [J].
Kundur, D ;
Hatzinakos, D .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1167-1180
[8]  
Naor N., 1994, LECT NOTE COMPUTER S, P1
[9]  
VOYATZIS G, 1996, P IEEE INT C IM PROC, V2, P237