Copyright Assurance Scheme for computerized Color Images Utilizing Key based Visual Cryptography Watermarking

With rapidly growing network, Internet has turned into an essential wellspring of transmitting confidential or secret data, for example, military data, money related records, and so forth. In such cases, strategies committed to ensure such kind of information are needed and they play an imperative role in providing confidential and secure transmission over network. Visual cryptography scheme is a cryptographic strategy which allows visual information to be encoded in such a way that the decoding can be performed by the human visual system, without the guide of PCs. In this article, it is proposed that a copyright assurance scheme for computerized color images utilizing key based Visual Cryptography Watermarking to accomplish the requirements of robustness and security. The master share is encoded with a copyright image to form another share called proprietorship share. The master share is kept with a central authority and possession share is kept by the copyright proprietor. In case of any dispute, the master shares and proprietorship shares can be stacked together to give the copyright image confirming the possession about the host picture. The imperative feature of this technique is that it will not disturb the host image either during copyright generation nor during copyright check. At long last, trial comes about demonstrate that the proposed plan can oppose a few basic assaults.

[1]  Douglas R. Stinson,et al.  Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels , 2002, Des. Codes Cryptogr..

[2]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[3]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[4]  James A. Reeds,et al.  "Cracking" a Random Number Generator , 1977, Cryptologia.

[5]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[6]  Mohan S. Kankanhalli,et al.  Visual cryptography for print and scan applications , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[7]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[8]  Young-Chang Hou,et al.  Copyright protection scheme for digital images using visual cryptography and sampling methods , 2005 .

[9]  S. Ghaemmaghami,et al.  A Novel Video Watermarking Method Using Visual Cryptography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.

[10]  Oscar C. Au,et al.  Joint visual cryptography and watermarking , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[11]  Heung-Kyu Lee,et al.  Color extended visual cryptography using error diffusion , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[12]  Craig B. Borkowf,et al.  Random Number Generation and Monte Carlo Methods , 2000, Technometrics.