[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3616901.3616958acmotherconferencesArticle/Chapter ViewAbstractPublication PagesfaimlConference Proceedingsconference-collections
research-article

A New Scheme for Digital Watermarking of Color Image Based on DCT and (2, 2) Visual Cryptography

Published: 05 March 2024 Publication History

Abstract

Digital watermarking is a very effective technology in digital copyright protection. To improve the security and robustness of digital watermarking technology, a new color image digital watermarking scheme based on visual cryptography and DCT is proposed. Firstly, the watermark is preprocessed by the (2, 2) visual cryptography, in which pixel expansion is 2, and two shared images are obtained, and one of them is used as the watermark information to be embedded in the carrier image. Secondly, the carrier image is divided into 8×8 blocks, then discrete cosine transform is performed, and then the watermark information is embedded in the medium frequency coefficients of the DCT domain by the additive embedding method according to a certain principle. When verifying copyright information, just stack and reduce the extracted image with another shared image, without requiring a lot of calculation and complex cryptography knowledge. Experiments show that this scheme is not only secretive, the watermark information cannot be detected, it can meet the needs of copyright protection, but also has high security and strong robustness. The watermark information cannot be restored by any attack method that does not meet the recovery conditions; It can against many common attacks such as white noise, Gaussian noise, salt and pepper noise, speckle noise, median filter, Gaussian low-pass filter, JPEG compression and so on. Therefore the proposed scheme is effective, and the overall performance is good.

References

[1]
Himanshu, Rawat, S., Raman, B., & Bhatnagar, G. . (2010). DCT and SVD Based New Watermarking Scheme. International Conference on Emerging Trends in Engineering & Technology. IEEE Computer Society.
[2]
Lin, S. D., Shie, S. C., & Guo, J. Y. . (2010). Improving the robustness of dct-based image watermarking against jpeg compression. Computer Standards & Interfaces, 32(1-2), 54-60.
[3]
Wu, X., & Sun, W. (2013). Robust copyright protection scheme for digital images using overlapping DCT and SVD. Applied Soft Computing, 13(2), 1170-1182.
[4]
Wang, W., Men, A., & Chen, X. . (2009). Robust Image Watermarking Scheme Based on Phase Features in DFT Domain and Generalized Radon Transformations. International Congress on Image & Signal Processing. IEEE.
[5]
Cedillo-Hernandez, M., Garcia-Ugalde, F. J., Nakano-Miyatake, M., & Perez-Meana, H. M. . (2012). DFT-Based Watermarking Method for Medical Images. Electronics, Robotics and Automotive Mechanics Conference (CERMA), 2012 IEEE Ninth. IEEE.
[6]
Pun, C. M. . (2007). A Novel DFT-based Digital Watermarking System for Images. International Conference on Signal Processing. IEEE.
[7]
Lai, C. C. . (2010). Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Transactions on Instrumentation & Measurement, 59(11), 3060-3063.
[8]
Run, R. S., Horng, S. J., Lin, W. H., Kao, T. W., Fan, P., & Khan, M. K. . (2011). An efficient wavelet-tree-based watermarking method. Expert Systems with Applications An International Journal, 38(12), 14357-14366.
[9]
Keyvanpour, M. R., & Bayat, F. M. . (2013). Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the dwt domain. Mathematical & Computer Modelling, 58(1-2), 56-67.
[10]
Chang, C. C., Hsiao, J. Y., & Yeh, J. C. . (2002). A colour image copyright protection scheme based on visual cryptography and discrete cosine transform. Journal of Photographic Science, 50(3), 133-140.
[11]
Fatahbeygi, A., & Tab, F. A. . (2019). A highly robust and secure image watermarking based on classification and visual cryptography. Journal of Information Security and Applications, 45(APR.), 71-78.
[12]
Kulkarni, P., & Kulkarni, G. . (2018). Visual Cryptography based Grayscale Image Watermarking in DWT domain. 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE.
[13]
Naor, M., & Shamir, A. . (1994). Visual cryptography. Workshop on the Theory and Application of of Cryptographic Techniques. Springer, Berlin, Heidelberg.
[14]
Base, C., Naor, M., & Shamir, A. . (1997). Visual Cryptography II: Improving the Contrast Via the Cover Base. Springer Berlin Heidelberg.
[15]
Tirkel, A. Z., & Rankin, G. A. . (1993). Electronic water mark. digital image computing technology & applications.
[16]
Cox, I. J., Miller, M. L., & Bloom, J. A. . (2002). Watermark security. Digital Watermarking, 279-317.
[17]
Cox, I. J., Kilian, J., Leighton, T., & Shamoon, T. . (2015). A secure, robust watermark for multimedia. Springer-Verlag (Vol.1174, pp.185-206). Springer-Verlag.
[18]
Shaamala, A., Abdullah, S. M., & Manaf, A. A. . (2011). Study of the effect DCT and DWT domains on the imperceptibility and robustness of Genetic watermarking. Springer Berlin Heidelberg. Springer Berlin Heidelberg.
[19]
Chen Q, Zhang X, & Ma W. (2015). Normalized Robust Blind Watermarking Technology. Telecom Power Technology, 32(1), 4. (in chinese).
[20]
Saboori, A., & Hosseini, A. . (2014). A New Method For Digital Watermarking Based on Combination of DCT and PCA. Telecommunications Forum Telfor (TELFOR), 2014 22nd. IEEE.
[21]
Su N. (2016). Research and Application of Digital Wartermarking Algorithm Based on DCT Transform Domain. (Doctoral dissertation, University of Electronic Science and Technology of China). (in chinese).

Index Terms

  1. A New Scheme for Digital Watermarking of Color Image Based on DCT and (2, 2) Visual Cryptography

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    FAIML '23: Proceedings of the 2023 International Conference on Frontiers of Artificial Intelligence and Machine Learning
    April 2023
    296 pages
    ISBN:9798400707544
    DOI:10.1145/3616901
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 March 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Color Image
    2. DCT
    3. Digital Watermarking
    4. Robustness
    5. Visual Cryptography

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    FAIML 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 20
      Total Downloads
    • Downloads (Last 12 months)20
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 04 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media