Two dimensional discrete fractional Fourier transform
Signal Processing
Pattern Recognition Letters
A hybrid SVD-DCT watermarking method based on LPSNR
Pattern Recognition Letters
A copyright protection scheme for digital images using visual cryptography technique
Computer Standards & Interfaces
On the security of a copyright protection scheme based on visual cryptography
Computer Standards & Interfaces
A wavelet-tree-based watermarking method using distance vector of binary cluster
Expert Systems with Applications: An International Journal
A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography
Computer Standards & Interfaces
Dual Digital Watermarking Algorithm for Image Based on Fractional Fourier Transform
WMWA '09 Proceedings of the 2009 Second Pacific-Asia Conference on Web Mining and Web-based Application
Improving the robustness of DCT-based image watermarking against JPEG compression
Computer Standards & Interfaces
Local histogram based geometric invariant image watermarking
Signal Processing
A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression
Digital Signal Processing
Digital computation of the fractional Fourier transform
IEEE Transactions on Signal Processing
Toward robust logo watermarking using multiresolution image fusion principles
IEEE Transactions on Multimedia
Image encryption process based on chaotic synchronization phenomena
Signal Processing
Hi-index | 0.08 |
This paper presents a robust copyright protection scheme based on fractional Fourier transform (FrFT) and visual cryptography (VC). Unlike the traditional schemes, in our scheme, the original image is not modified by embedding the watermark into the original image. We use the visual secret sharing scheme to construct two shares, namely, master share and ownership share. Features of the original image are extracted using SVD, and are used to generate the master share. Ownership share is generated with the help of secret image (watermark) and the master share, using VC technique. The two shares separately give no information about the secret image, but for ownership identification, the secret image can be revealed by stacking the master share and the ownership share. In order to achieve the robustness and security, the properties of VC, FrFT and SVD are used in our scheme. The experimental results show that the proposed scheme is strong enough to resist various signal processing operations.