Hidden digital watermarks in images
IEEE Transactions on Image Processing
Cheating in Visual Cryptography
Designs, Codes and Cryptography
A copyright protection scheme for digital images using visual cryptography technique
Computer Standards & Interfaces
Colored visual cryptography scheme based on additive color mixing
Pattern Recognition
A multisecret sharing scheme for color images based on cellular automata
Information Sciences: an International Journal
Memetic Algorithm-Based Image Watermarking Scheme
ISNN '08 Proceedings of the 5th international symposium on Neural Networks: Advances in Neural Networks
Visual-based embedding systems with targeted secret disclosures and applications
International Journal of Ad Hoc and Ubiquitous Computing
A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography
Computer Standards & Interfaces
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
A Karnaugh map {2,2} secret sharing scheme for color images
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
A novel user-participating authentication scheme
Journal of Systems and Software
A novel watermarking scheme based on PSO algorithm
LSMS'07 Proceedings of the Life system modeling and simulation 2007 international conference on Bio-Inspired computational intelligence and applications
A secret image sharing scheme based on vector quantization mechanism
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
A cost-effective private-key cryptosystem for color image encryption
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part I
A new secret sharing scheme for images based on additive 2-dimensional cellular automata
IbPRIA'05 Proceedings of the Second Iberian conference on Pattern Recognition and Image Analysis - Volume Part I
Color image sharing method based on lagrange's interpolating polynomial
HIS'12 Proceedings of the First international conference on Health Information Science
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
Robust copyright protection scheme for digital images using overlapping DCT and SVD
Applied Soft Computing
Hi-index | 0.10 |
In this paper, we describe an image protection method for image intellectual property. The concept of this paper is based on the visual secret sharing scheme. We use the visual secret sharing scheme to construct two shares (also called transparencies). One share is generated from the host image, and the other share is arbitrarily generated by the owner. When the owner needs to be identified, we can superimpose these two shares to recover the secret information in order to validate the ownership. Our method has three advantages. The first advantage is simple computation, which means that our method does not use any complex computations such as discrete cosine transformation (DCT), and thus our method can be executed efficiently. The second advantage is that our method does not change any pixels of the host image. The third advantage is that our method is secure and robust. From the experimental results, our method can tolerate several image attacks, e.g., blurring, cropping, sharpening, JPEG lossy compression, etc.