Multiuser-based shadow watermark extraction system

被引:29
作者
Wang, Feng-Hsing
Yen, Kang K.
Jain, Lakhmi C.
Pan, Jeng-Shyang [1 ]
机构
[1] Natl Kaohsiung Univ Appl Sci, Dept Elect Engn, Kaohsiung, Taiwan
[2] Univ S Australia, Sch Elect & Informat Engn, Adelaide, SA 5001, Australia
[3] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33199 USA
关键词
watermarking; visual cryptography (VC); key design;
D O I
10.1016/j.ins.2006.12.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new watermarking scheme having the ability of sharing secret with multi-users is proposed. It splits the original watermark into two shares and embeds one share into the cover image to increase the security. A polarization procedure is performed to establish a polarity stream from the cover image. The second share and the polarity stream are used to generate a master key and several normal keys. In this system, only the super-user can reveal the genuine watermark directly. Other users possess the normal keys can obtain shadow watermarks merely. By combining the shadow watermarks together, the real watermark can be recovered. (c) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:2522 / 2532
页数:11
相关论文
共 22 条
[1]  
Barni M., 2004, Watermarking Systems Engineering: Enabling Digital Assets security and Other Applications
[2]   Hadamard transform based fast codeword search algorithm for high-dimensional VQ encoding [J].
Chu, Shu-Chuan ;
Lu, Zhe-Ming ;
Pan, Jeng-Shyang .
INFORMATION SCIENCES, 2007, 177 (03) :734-746
[3]   DCT-based image watermarking using subsampling [J].
Chu, WC .
IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (01) :34-38
[4]  
Gersho A., 1992, VECTOR QUANTIZATION
[5]  
Hou YC, 2000, 2000 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I-III, P992, DOI 10.1109/ICOSP.2000.891692
[6]   Hidden digital watermarks in images [J].
Hsu, CT ;
Wu, JL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) :58-68
[7]   Wavelet domain adaptive visible watermarking [J].
Hu, YJ ;
Kwong, S .
ELECTRONICS LETTERS, 2001, 37 (20) :1219-1220
[8]   Embedding image watermarks in DC components [J].
Huang, JW ;
Shi, YQ ;
Shi, Y .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2000, 10 (06) :974-979
[9]  
Katzenbeisser S., 2000, ARTECH HOUSE LONDON, V1st
[10]   Audio watermarking techniques using sinusoidal patterns based on pseudorandom sequences [J].
Liu, Z ;
Inoue, A .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (08) :801-812