An image copyright protection scheme by encrypting secret data with the host image

In this paper, a zero-watermarking based copyright protection scheme is proposed. The secret watermark image is not embedded in the host image rather it is encrypted with the host image. The proposed scheme is making use of discrete cosine transform and singular value decomposition to extract robust features of the host image. Further the selected robust features are used to encrypt the secret image. The secret image is encrypted with the host image by generating two shares namely master share and ownership share. The master share is generated by differential classification of features extracted. The ownership share is generated with the help of master share and the secret image. The two shares separately don’t give any clue of the secret image but when stacked together the encrypted secret image is revealed. Experimental study is conducted to evaluate the robustness of the algorithm against various signal processing and geometrical attacks.

[1]  Gaurav Bhatnagar,et al.  A new robust reference logo watermarking scheme , 2011, Multimedia Tools and Applications.

[2]  Young-Chang Hou,et al.  Copyright protection scheme for digital images using visual cryptography and sampling methods , 2005 .

[3]  Balasubramanian Raman,et al.  A blind watermarking algorithm based on fractional Fourier transform and visual cryptography , 2012, Signal Process..

[4]  Pingzhi Fan,et al.  Copyright Protection for E-Government Document Images , 2012, IEEE MultiMedia.

[5]  Gaurav Bhatnagar,et al.  A new aspect in robust digital watermarking , 2011, Multimedia Tools and Applications.

[6]  Pingzhi Fan,et al.  An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization , 2008, IEEE Transactions on Multimedia.

[7]  Wei Jin,et al.  A novel image zero-watermarking scheme based on DWT-SVD , 2011, 2011 International Conference on Multimedia Technology.

[8]  Ren-Junn Hwang,et al.  A Digital Image Copyright Protection Scheme Based on Visual Cryptography , 2000 .

[9]  S. Pereira,et al.  Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.

[10]  Edward J. Delp,et al.  Watermark evaluation testbed , 2006, J. Electronic Imaging.

[11]  Guangyong Gao Composite chaos-based lossless image authentication and tamper localization , 2012, Multimedia Tools and Applications.

[12]  Yuan-Pei Lin,et al.  Wavelet tree quantization for copyright protection watermarking , 2004, IEEE Transactions on Image Processing.

[13]  Takuji Nishimura,et al.  Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.

[14]  Mohammed Ghanbari,et al.  Scope of validity of PSNR in image/video quality assessment , 2008 .

[15]  Xiamu Niu,et al.  Print-and-scan model and the watermarking countermeasure , 2005, Image Vis. Comput..

[16]  Yongsheng Zhao,et al.  A blind double color image watermarking algorithm based on QR decomposition , 2013, Multimedia Tools and Applications.

[17]  Balasubramanian Raman,et al.  Blind reliable invisible watermarking method in wavelet domain for face image watermark , 2014, Multimedia Tools and Applications.

[18]  Gwoboa Horng,et al.  A publicly verifiable copyright-proving scheme resistant to malicious attacks , 2005, IEEE Transactions on Industrial Electronics.

[19]  Ming-Shi Wang,et al.  A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography , 2009, Comput. Stand. Interfaces.

[20]  Wei-Cheng Chen,et al.  Digital image copyright protection scheme based on visual cryptography and singular value decomposition , 2007 .

[21]  Bin Yu,et al.  Optimal pixel expansion of deterministic visual cryptography scheme , 2013, Multimedia Tools and Applications.

[22]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[23]  Lakhmi C. Jain,et al.  Multiuser-based shadow watermark extraction system , 2007, Inf. Sci..

[24]  Hanqiang Cao,et al.  A zero-watermarking algorithm based on DWT and chaotic modulation , 2006, SPIE Defense + Commercial Sensing.

[25]  Asha Rani,et al.  A robust watermarking scheme exploiting balanced neural tree for rightful ownership protection , 2014, Multimedia Tools and Applications.

[26]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[27]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[28]  Chin-Chen Chang,et al.  An image intellectual property protection scheme for gray-level images using visual secret sharing strategy , 2002, Pattern Recognit. Lett..

[29]  Takao Terano,et al.  Image copyright protection with forward error correction , 2009, Expert Syst. Appl..

[30]  Shi-Jinn Horng,et al.  A wavelet-tree-based watermarking method using distance vector of binary cluster , 2009, Expert Syst. Appl..