A steganographic method based upon JPEG and quantization table modification
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Intelligent multimedia computing and networking
Pattern Recognition Letters
A public verifiable copy protection technique for still images
Journal of Systems and Software
A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
Hiding secret data in images via predictive coding
Pattern Recognition
A steganographic scheme for secure communications based on the chaos and euler Theorem
IEEE Transactions on Multimedia
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A wavelet-based watermarking algorithm for ownership verification of digital images
IEEE Transactions on Image Processing
Lossless generalized-LSB data embedding
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
Modified patchwork-based watermarking scheme for satellite imagery
Signal Processing
An improvement of robust and blind data hiding based on self reference in spatial domain
CEA'07 Proceedings of the 2007 annual Conference on International Conference on Computer Engineering and Applications
Wavelet-based copyright-protection scheme for digital images based on local features
Information Sciences: an International Journal
Data hiding based on compressed VQ indices of images
Computer Standards & Interfaces
MP4Stego: steganography in MPEG-4 videos
International Journal of Advanced Media and Communication
Improving the robustness of DCT-based image watermarking against JPEG compression
Computer Standards & Interfaces
Meaningful secret sharing technique with authentication and remedy abilities
Information Sciences: an International Journal
Journal of Systems and Software
Block-based progressive visual secret sharing
Information Sciences: an International Journal
Visual cryptography based watermarking: definition and meaning
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.00 |
A robust copyright protection scheme for digital image is proposed in the paper. In the proposed scheme, the watermark does not require to be embedded into the protected image but is used to generate a secret image and a public image by using the visual cryptography technique. Then the secret image is registered to certified authority (CA) for further protection. In the step of watermark extraction, the watermark can be acquired by performing exclusive-OR (XOR) operation between the secret image and the public image. The experimental results show that the proposed scheme not only can clearly verify the copyright of the digital image, but also is robust to withstand several image processing attacks such as JPEG lossy compression, cropping, noise adding, sharpening and blurring attacks.