An IPR protection scheme based on wavelet transformation and visual cryptography

An IPR protection scheme based on wavelet transformation and visual cryptography

As information technology is fast developing, it brings great convenience to our everyday life. However, hackers may also access confidential data illegally and easily from computers over the Internet. Therefore, how to protect property rights against infringement is an essential issue. Digital watermarking is a method that adds personal information to an intellectual property to protect one s ownership rights. Should the intellectual property be disputed, the owner can retrieve the watermark and prove ownership rights. Based on the principles of visual cryptography and the law of large numbers, our study generates shares by comparing pseudorandomly selected value pairs during the processes of embedding and verifying the hidden watermark. The wavelet transformation coefficients of the LL3 region are used as the sample population. Experimental results indicate that our method has good robustness against darkening, lightening, blurring, sharpening, noising, distortion, jitter, JPEG, and cropping attacks. There are 3 advantages to our method: 1) robustness is retained when the protected image suffers from attacks; 2) unexpanded shares are created to reduce the size of every share; 3) the embedded watermark is decoded by the human visual system during the verification process.

___

  • [1] Lee SJ, Jung SH. A survey of watermarking techniques applied to multimedia. In: IEEE International Symposium on Industrial Electronics; 12–16 June 2001; Pusan, South Korea. Piscataway, NJ, USA: IEEE. pp. 272-277.
  • [2] Cox I, Miller ML. A review of watermarking and the importance of perceptual modeling. In: 1997 Proceedings of SPIE 3016; 8 February 1997; San Jose, CA, USA. Bellingham, WA, USA: SPIE. pp. 92–99.
  • [3] Karibali IG, Berberidis K. Efficient spatial image watermarking via new perceptual masking and blind detection scheme. IEEE T Inf Foren Sec 2006; 1: 256-274.
  • [4] Nguyen TV, Patra JC. A simple ICA-based digital image watermarking scheme. Digit Signal Process 2008; 18: 762-776.
  • [5] Patra JC, Phua JE, Bornand C. A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit Signal Process 2010; 20: 1597-1611.
  • [6] Zhu H, Liu M, Li Y. The RST invariant digital image watermarking using Radon transforms and complex moments. Digit Signal Process 2010; 20: 1612-1628.
  • [7] Wang Y, Doherty JF, Van Dyck RE. A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE T Image Process 2002: 11: 77-88.
  • [8] Fakhari P, Vahedi E, Lucas C. Protecting patient privacy from unauthorized release of medical images using a bio-inspired wavelet-based watermarking approach. Digit Signal Process 2011; 21: 433-446.
  • [9] Vahedi E, Zoroofi RA, Shiva M. Toward a new wavelet-based watermarking approach for color images using bioinspired optimization principles. Digit Signal Process 2012; 22: 153-162.
  • [10] Barni M, Bartolini F, Piva A. Improved wavelet-based watermarking through pixel-wise masking. IEEE T Image Process 2001; 10.5: 783-791.
  • [11] Naor M, Shamir A. Visual cryptography. In: Workshop on the Theory and Application of Cryptographic Techniques; 9–12 May 1994; Perugia, Italy. pp. 1-12.
  • [12] Hou YC. Copyright protection based on visual cryptography. In: Conference on Systemics, Cybernetics and Informatics 2002; 18 July 2002; Orlando, Florida. Orlando, FL: IIIS. pp. 104-109.
  • [13] Hsu CS, Hou YC. Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 2005; 44: 077003.
  • [14] Hou YC, Huang PH. An ownership protection scheme based on visual cryptography and the law of large numbers. Int J Innov Comput Inform Control 2012; 8: 4147-4156.
  • [15] Rawat S, Raman B. A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Process 2012; 92: 1480-1491.
  • [16] Singh TR, Singh KM, Roy S. Video watermarking scheme based on visual cryptography and scene change detection. AEU-Int J Electron C 2013; 67: 645-651.
  • [17] Benyoussef M, Mabtoul S, Marraki Me, Aboutajdine D. Robust image watermarking scheme using visual cryptography in dual-tree complex wavelet domain. Journal of Theoretical and Applied Information Technology 2014; 60: 372-379.
  • [18] Luo X, Jiang DY, Li D. A blind holographic image watermarking algorithm based on dual transform domains and visual cryptography. International Journal of Security and Its Applications 2014. 8: 291-302.
  • [19] Chang CC, Hsiao JY, Yeh JC. A colour image copyright protection scheme based on visual cryptography and discrete cosine transform. Imaging Sci J 2002; 50: 133-140.
  • [20] Hsieh SL, Tsai IJ, Huang BY, Jian JJ. Protecting copyrights of color images using a watermarking scheme based on secret sharing and wavelet transform. J Multimedia 2008; 3: 42-49.
  • [21] Lou DC, Tso HK, Liu JL. A copyright protection scheme for digital images using visual cryptography technique. Comput Stand Inter 2007; 29: 125-131.
  • [22] Ateniese G, Blundo C, De Santis A, Stinson DR. Extended schemes for visual cryptograph. Theor Comput Sci 2001; 250: 143-161.
  • [23] Hou YC. Visual cryptography for color images. Pattern Recogn 2003; 36: 1619-1629.
  • [24] Hou YC, Quan ZY. Progressive visual cryptography with unexpanded shares. IEEE T Circ Syst Vid 2011; 21: 1760-1764.
  • [25] Hou YC, Quan ZY, Tsai CF, Tseng AY. Block-based progressive visual secret sharing. Inform Sciences 2013; 233: 290-304.
  • [26] Ito R, Kuwakado H, Tanaka H. Image size invariant visual cryptography. IEICE T Fund Electr 1999; E82-A: 2172-2177.
  • [27] Shyu SJ. Image encryption by random grids. Pattern Recogn 2007; 40: 1014-1031.
  • [28] Tu SF, Hou YC. On the design of visual cryptographic methods with smooth-looking decoded images of invariant size for gray level images. Imaging Sci J 2007; 55: 90-10.
  • [29] Fridrich J, Goljan M, Du R. Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 2001; 8: 22-28.
  • [30] Yang CH, Weng CY, Wang SJ, Sun HM. Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE T Inf Foren Sec 2008; 3: 488-497.
  • [31] Kalantari NK, Akhaee MA, Ahadi SM, Amindavar H. Robust multiplicative patchwork method for audio watermarking. IEEE T Audio Speech 2009; 17: 1133-1141.
  • [32] Sluciak O, Vargic R. An audio watermarking method based on wavelet patchwork algorithm. In: 15th International Conference on Systems, Signals and Image Processing; 25–28 June 2008; Bratislava, Slovakia. Bratislava, Slovakia: Slovak University of Technology in Pub. House STU. pp. 117-120.
  • [33] Stollnitz EJ, DeRose TD, Salesin DH. Wavelets for computer graphics: a primer. IEEE Comput Graph 1995; 15: 75-85.
  • [34] Hogg RV, Tanis E. Probability and Statistical Inference. Boston, MA, USA: Pearson, 2009.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: Yılda 6 Sayı
  • Yayıncı: TÜBİTAK
Sayıdaki Diğer Makaleler

A current feedback control strategy for parallel-connected single-phase inverters using a third-order general-integrator crossover cancellation method

Yuan HUANG, An LUO

Performance comparison of adaptive digital predistortion algorithms using adaptation time for mobile WiMAX power amplifier applications

Ji-Yeon KIM, Jong-Heon KIM

A new step-size searching algorithm based on fuzzy logic and neural networks for LMS adaptive beamforming systems

Mariko MIYATAKE NAKANO, Hector MEANA PEREZ, Walter TUPACYUPANQUI OROZCO

A conceptual implementation of a buck converter for an off-grid hybrid system consisting of solar and wind turbine sources

Ahmad Shukri RAHMAN FAZIL, Abdul Rahim RAZAK ABDUL, Syed Idris HASSAN SYED

Internet-based multiuser in-circuit emulator design for 8051 microprocessors

Kubilay TAŞDELEN, Akif KUTLU

Energy-efficient mobile cluster-head data collection model for wireless sensor networks

Sanjeev SOFAT, Renu VIG, Nidhi GAUTAM

Adaptive speed observer with disturbance torque compensation for sensorless induction motor drives using RT-Lab

Mohan KRISHNA, Febin DAYA

Determination of the striking distance of a lightning rod using finite element analysis

Hazlee Azil ILLIAS, Hazlie MOKHLIS, Ab Halim BAKAR ABU, Syahirah HALIM ABD, Nor Hidayah HASSAN NOR, Chia Kwang TAN, Alyaa ABIDIN ZAINAL

Fuzzy based design of digital IIR filter using ETLBO

Damanpreet SINGH, Jaspreet Singh DHILLON

An attribute or tuple timestamping in bitemporal relational databases

Canan ATAY