Journal of Information Security

Volume 3, Issue 2 (April 2012)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

A Visual Cryptography Based Digital Image Copyright Protection

HTML  Download Download as PDF (Size: 447KB)  PP. 96-104  
DOI: 10.4236/jis.2012.32012    6,961 Downloads   12,882 Views  Citations

ABSTRACT

A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image.

Share and Cite:

A. Hammad Abusitta, "A Visual Cryptography Based Digital Image Copyright Protection," Journal of Information Security, Vol. 3 No. 2, 2012, pp. 96-104. doi: 10.4236/jis.2012.32012.

Cited by

[1] Cryptanalysis on Digital Image Watermarking Based on Feature Extraction and Visual Cryptography
2019
[2] Optimal Lightweight Encryption Based Secret Share Creation Scheme for Digital Images in Wireless Sensor Networks
2019
[3] Visual Cryptography based Grayscale Image Watermarking in DWT domain
2018
[4] A Digital Watermarking Algorithm based on Image Size Invariant Visual Cryptography
Journal of Dali University, 2017
[5] Performance Evaluation of watermarking Schemes to Decide Meaningful Number of Shares
International Conference on Science & Engineering for Sustainable Development, 2017
[6] 基于像素不扩展视觉密码的水印算法
2017
[7] VODOZNAČENÍ MEDICÍNSKÝCH OBRAZOVÝCH DAT
Thesis, 2017
[8] Protecting medical images in cloud using visual cryptography scheme
2017
[9] Mammograms Multiple Watermarking Scheme Based on Visual Cryptography
Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015, 2016
[10] Digital Watermarking Based on Visual Cryptography and Histogram
World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2016
[11] A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography
2016
[12] Extended capabilities of feature-extraction for digital image sharing by diverse image media
2016
[13] 基于图像边缘信息的视觉密码零水印算法
软件导刊, 2016
[14] 基于 MSB 的视觉密码零水印算法
大理学院学报: 综合版, 2015
[15] 基于可视加密和特征匹配的鲁棒彩色图像水印
计算机应用, 2015
[16] Watermarking in Regional Medical Imaging
2015
[17] Zero-Watermarking Visual Cryptography Algorithm Based on MSB
2015
[18] Medical image watermarking for copyright protection based on Visual Cryptography
Multimedia Computing and Systems (ICMCS), 2014 International Conference on. IEEE, 2014
[19] 小波域视觉密码零水印算法
中国图象图形学报, 2014
[20] 平衡多小波视觉密码零水印算法
计算机工程, 2014
[21] A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Iraqi Journal of Applied Physics, 2014
[22] Using Color Visual Cryptography Schemes and Watermarking for Sharing Black and White Secret Images
International Journal of Computer Applications, 2014
[23] ROBUST IMAGE WATERMARKING SCHEME USING VISUAL CRYPTOGRAPHY IN DUAL-TREE COMPLEX WAVELET DOMAIN.
Journal of Theoretical & Applied Information Technology, 2014
[24] Digital Watermarking Scheme For Secret Images Using Visual Cryptography
International Journal of Scientific & Engineering Research, 2013
[25] Blind Invisible Watermarking Technique in DT-CWT Domain Using Visual Cryptography
Image Analysis and Processing–ICIAP 2013. Springer Berlin Heidelberg, 2013
[26] Optimal Number Of Shares For Digital Water-marking Scheme Using Visual Cryptography
International Journal of Scientific & Engineering Research, 2013

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.