Visual cryptography for general access structures
Information and Computation
Technical trials and legal tribulations
Communications of the ACM
Constructions and Bounds for Visual Cryptography
ICALP '96 Proceedings of the 23rd International Colloquium on Automata, Languages and Programming
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
Second Generation Benchmarking and Application Oriented Evaluation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Watermarking and ownership problem: a revisit
Proceedings of the 5th ACM workshop on Digital rights management
Security issues in watermarking applications - a deeper look
Proceedings of the 4th ACM international workshop on Contents protection and security
A copyright protection scheme for digital images using visual cryptography technique
Computer Standards & Interfaces
On the security of a copyright protection scheme based on visual cryptography
Computer Standards & Interfaces
Innovations in Digital Watermarking Techniques
Innovations in Digital Watermarking Techniques
Innovations in Digital Watermarking Techniques
Innovations in Digital Watermarking Techniques
Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision)
Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision)
Visual cryptography for digital watermarking in still images
PCM'04 Proceedings of the 5th Pacific Rim Conference on Advances in Multimedia Information Processing - Volume Part II
Hi-index | 0.00 |
The proliferation of digital data, and their distribution over different kinds of communication channels are making the copyright protection a very important issue in the digital world. Watermarking techniques and visual cryptographic schemes have been recently used in different approaches for the copyright protection of digital images. Watermarking is generally used to embed "secret" information into an original image, with different purposes and different features, usually as a means to assess the ownership of the modified image. Visual cryptography refers to a way to decompose a secret image into shares and distribute them to a number of participants, so that only legitimate subsets of participants can reconstruct the original image by combining their shares. The combination of both techniques can provide some important solutions for tampering verification and the resolution of disputes on the ownership of a given image, as provided by several proposals appeared in literature. In this work we try to provide a general model for the watermarking schemes obtained from the combination with visual cryptography. Furthermore we discuss some possible extensions of the combined approach taking into account different visual cryptographic schemes where multiple participants are involved and their possible applications in new scenarios.