Watermarking-Based Transparency Authentication in Visual Cryptography

This paper proposes two transparency authentication schemes used in visual cryptography, which are based on watermarking techniques. In the first scheme, a secret image can be perceptible when stacking two transparencies. In addition, another watermark image is visible when shifting one transparency to an appropriate position and stacking it with the other transparency. In the second scheme, both the secret image and the watermark are of the same size, while in the first scheme, the watermark is half of the size of the secret image. No computer aid is needed in decryption in the first scheme while simple computation is required in the second one. The secret image and the watermark are encrypted at the same time in the two schemes. Experimental results demonstrate the two schemes are effective and practical.

[1]  L. Jain,et al.  Intelligent and watermarking techniques , 2004 .

[2]  Lakhmi C. Jain,et al.  Intelligent Watermarking Techniques: (With CD-ROM) , 2004 .

[3]  Chang-Chou Lin,et al.  Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..

[4]  Wen-Guey Tzeng,et al.  Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.

[5]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[6]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[7]  Mohan S. Kankanhalli,et al.  Progressive color visual cryptography , 2005, J. Electronic Imaging.

[8]  Moni Naor,et al.  Visual cryptography for grey level images , 2000, Inf. Process. Lett..