[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Multi-user Based Watermarking System with Two-Security-Level Keys

  • Conference paper
  • First Online:
Digital Watermarking (IWDW 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2613))

Included in the following conference series:

Abstract

A vector quantisation (VQ) based watermarking scheme with shadow watermark extraction ability for multi-users is proposed. One watermark is embedded only in the host image, and only the user with the first-class key can extract the original watermark directly; other users with the second-class keys can only extract the shadow watermarks. The watermark can also be obtained by combining all the shadow watermarks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cox, I. J., Miller, M. L., Bloom, J. A.: Digital watermarking. Morgan Kaufmann (2000)

    Google Scholar 

  2. Noar, M., Shamir, A.: Visual cryptography. Lecture Notes in Computer Science. Springer-Verlag, Perugia Italy (1994) 1–12

    Google Scholar 

  3. Stinson, D.: Visual cryptography and threshold schemes. Vol. 18. IEEE Potentials (1999) 13–16

    Article  Google Scholar 

  4. Huang, H.-C., Wang, F. H., Pan, J. S.: Efficient and robust watermarking algorithm with vector quantisation. Vol. 37. Electronics Letters (2001) 826–828

    Article  Google Scholar 

  5. Huang, H.-C., Wang, F. H., Pan, J. S.: A VQ-based robust multi-watermarking algorithm. IEICE Transactions on Fundamentals of Electronics, Communication and Computer Sciences (2002) 1719–1726

    Google Scholar 

  6. Pan J. S., Wang, F. H., Yang, T. C., Jain, L. C.: A gain-shape VQ based watermarking technique with modified visual secret sharing scheme. International Conference on Knowledge-Based Intelligent Information and Engineering Systems, IEE, Italy (2002) 402–406

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, FH., Jain, L., Pan, JS. (2003). A Multi-user Based Watermarking System with Two-Security-Level Keys. In: Kim, H.J. (eds) Digital Watermarking. IWDW 2002. Lecture Notes in Computer Science, vol 2613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36617-2_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-36617-2_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-01217-7

  • Online ISBN: 978-3-540-36617-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics