CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Analyzing Visual Cryptography with Watermark Hiding Technique

Published on February 2013 by Kamaljit I Lakhtaria
International Conference on Recent Trends in Information Technology and Computer Science 2012
Foundation of Computer Science USA
ICRTITCS2012 - Number 8
February 2013
Authors: Kamaljit I Lakhtaria
ba749986-3697-4d88-99a4-cf0dc1f89293

Kamaljit I Lakhtaria . Analyzing Visual Cryptography with Watermark Hiding Technique. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 8 (February 2013), 4-8.

@article{
author = { Kamaljit I Lakhtaria },
title = { Analyzing Visual Cryptography with Watermark Hiding Technique },
journal = { International Conference on Recent Trends in Information Technology and Computer Science 2012 },
issue_date = { February 2013 },
volume = { ICRTITCS2012 },
number = { 8 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 4-8 },
numpages = 5,
url = { /proceedings/icrtitcs2012/number8/10300-1415/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science 2012
%A Kamaljit I Lakhtaria
%T Analyzing Visual Cryptography with Watermark Hiding Technique
%J International Conference on Recent Trends in Information Technology and Computer Science 2012
%@ 0975-8887
%V ICRTITCS2012
%N 8
%P 4-8
%D 2013
%I International Journal of Computer Applications
Abstract

In this paper, a watermark hiding scheme based on Visual Cryptography and Discrete Wavelet Transform is proposed. The proposed method modifies the codebook of related works, and utilizes statistical average to offer better security. The proposed method also reduces the size of the codebook and probability of false positives when compared to the existing works. Experimental results prove that the scheme is also robust to wide range of attacks

References
  1. R. J. Anderson, Ed. , Information Hiding, First International Workshop, LNCS, Springer-Verlag (1996) vol. 1174, pp. 1-7.
  2. M. Naor and A. Shamir. , Visual cryptography,in The Workshop on the Theory and Application of Cryptographic Techniques(1995), vol. 950, pp 1-12
  3. R. Hwang, A Digital Image Copyright Protection Scheme based on Visual Cryptography, Tamkang Journal of science and Engineering, . 3, 2(2002).
  4. C. C. Chang, J. C. Chuang. An image intellectual property protection scheme for gray level images using visual secret sharing strategy, Pattern Recognition Letters, 23,. 8 (2002).
  5. M. Hassan A, M. Khalili A, Self Watermarking based on Visual Cryptography, in The World Academy of Science, Engineering and Technology, 8, (2005)
  6. B. Surekha , G. N Swamy , K. Srinivasa Rao , A Ravi Kumar , A Watermarking Technique based on Visual Cryptography, Journal of Information Assurance and Security, 4,6 (2009).
  7. S. L. Hsieh, B. Y Huang, A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation, in International Computer Symposium, (2004), pp. 661-666,.
  8. D. C Lou, H. K Too, J. L. Iiu, A copyright protection scheme for digital images using visual cryptography technique, Computer Standards & Interfaces, 29, 1 (2007)
  9. T. H. Chen, C. C Chang, C. S. Wu, D. C Lou, On the security of a copyright protection scheme based on visual cryptography, Computer Standards & Interfaces, 31,1 (2009).
  10. G. D. Park, E. I. Yoon, K. Y. Yoo, A new copyright protection scheme with visual cryptography, in The Second International Conference on Future Generation Communication and Networking Symposia(2008), pp. 60-63.
  11. Y. Xing, J. H He, A new robust copyright protection scheme for digital images based on visual cryptography, in The International Conference on Wavelet Analysis and Pattern Recognition (2010), Qingdao, pp. 6-11
  12. W. Hawkes, A. Yasinsac, C. Cline, An Application of Visual Cryptography to Financial Documents, Technical report TR001001, Florida State University, (2000)
Index Terms

Computer Science
Information Sciences

Keywords

Copyright Protection Digital Watermarking Secret Sharing Visual Cryptography