Watermarking applications and their properties
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Wavelet-based copyright-protection scheme for digital images based on local features
Information Sciences: an International Journal
Multi-level visual secret sharing scheme with smooth-looking
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Visual cryptography based watermarking: definition and meaning
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.00 |
With copyright protection in mind, the robustness property of a new scheme is always one of main concerns. However, to claim robustness of watermarking techniques is meaningful only when the false positive probability is taken into consideration as well as robustness benchmark. In this paper, the security of a robust copyright-protection scheme based on visual cryptography proposed by Lou et al. is analyzed. We show that the false alarm of their scheme is not neglectable. Precisely, it is insecure since the verification watermark can be unreasonably extracted from other unprotected images using the identical secret key by the owner. The main weak design will be proved and shown by means of giving theoretical analysis and conducting some counter experiments.