[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Visual-based embedding systems with targeted secret disclosures and applications

Published: 01 December 2009 Publication History

Abstract

In this paper, a VWC-system is proposed. In the system, the embedded information can hold the secret for the encryption key. The system adopts the technique of frequency-domain watermarking and visual cryptography, respectively. Furthermore, the embedded part is only a share, meaning a portion of the watermark generated from a chosen KFI. The remaining shares not used in the embedding procedure are kept until the extraction procedure in order to reveal the targeted secret or copyright watermark shown in the message of the watermark image. Another feature is the key could be easily applied in a symmetric-key cryptosystem for a common key agreement via a public channel.

References

[1]
Chang, C.C. and Chuang, J.C. (2002) 'An image intellectual property protection scheme for gray-level images visual secret sharing strategy', Pattern Recognition Letters, Vol. 23, pp.931-943.
[2]
Chen, T.H. and Tsai, D.S. (2006) 'Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol', Pattern Recognition, Vol. 39, pp.1530-1541.
[3]
Cox, I.J., Miller, M.L. and Bloom, J.A. (2002) Digital Watermark, Morgan Kaufmann Publishers, USA, pp.11-26.
[4]
Dietze, M. and Jassim, S. (2002) 'The choice of filter banks for wavelet-based robust digital watermarking', Multimedia and Security Workshop at the ACM Multimedia, Online under http://herbert.the-little-red-haired-girl.org/en/research/papers/ filter_evaluation/,.
[5]
Hou, Y.C. and Chen, P.M. (2000) 'An asymmetric watermarking scheme based on visual cryptography', IEEE International Conference on Signal Processing Proceedings, Vol. 2, pp.992-995.
[6]
Kii, H., Onishi, J. and Ozawa, S. (1999) 'The Digital Watermarking Method by Using both Patchwork and DCT', Proc. Int. Conf. on Multimedia Computing and Systems, Vol. 1, pp.895-899.
[7]
Lin, C.C. and Tsai, W.H. (2004) 'Secret image sharing with steganography and authentication', Journal of Systems and Software, Vol. 73, No. 3, pp.405-414.
[8]
Lou, D.C. and Sung, C.H. (2004) 'A steganographic scheme for secure communications based on the Chaos and Euler Theorem', IEEE Trans. Multimedia, Vol. 6, No. 3, pp.501-509.
[9]
Lu, C.S., Huang, S.K., Sze, C.J. and Liao, H.Y.M. (2000) 'Cocktail watermarking for digital image protection', IEEE Transactions on Multimedia, Vol. 2, No. 4, December, pp.209-224.
[10]
Naor, M. and Shamir, A. (1995) 'Visual cryptography', Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Science, Vol. 950, Springer-Verlag, Italy, pp.1-12.
[11]
Voyatzis, G. and Pitas, I. (1996) 'Applications of toral automorphisms in image watermarking', Proceedings of IEEE International Conference of Image Processing, Vol. 2, pp.237-240.
[12]
Wang, C.C., Tai, S.C. and Yu, C.S. (2000) 'Repeating image watermarking technique by the visual cryptography', IEICE Trans. Fund. E83-A (8), pp.1589-1598.
[13]
Wang, S.J. and Yang, K.S. (2002) 'Watermark embedding mechanism using modulus-based for intellectual property protection on image data', E-Commerce and Web Technologies, Lecture Notes in Computer Science (LNCS), No. 2455, Springer-Verlag, France, pp.333-342.
[14]
Shamir, A. (1979) 'How to Share a Secret', Comm. ACM, Vol. 22, pp.612-613.
[15]
Hsu, C.T. and Wu, J.L. (1999) 'Hidden digital watermarks in images', IEEE Transactions Image Processing, Vol. 8, No. 1, January, pp.58-68.
[16]
Chang, C.C., Hwang, K.F. and Hwang, M.S. (2002) 'Robust authentication scheme for protection copyrights of images and graphics', IEE Proc.-Vision Image Signal Process., Vol. 149, No. 1, February, pp.43-50.
[17]
Cox, I.J., Kilian, J., Leighton, T. and Shamoon, T. (1997) 'Secure spread spectrum watermarking for multimedia', IEEE Transactions on Image Processing, Vol. 6, No. 12, December, pp.1673-687.
[18]
Lee, C.H. and Lee, Y.K. (1999) 'An adaptive digital image watermarking technique for copyright protection', IEEE Transactions on Consumer Electronics, Vol. 45, No. 4, November, pp.1005-1015.
[19]
Lin, P.L. (2001) 'Digital watermarking models for resolving rightful ownership and authenticating legitimate customer', The Journal of Systems and Software, Vol. 55, pp.261-271.
[20]
Kim, Y.S., Kwon, O.H. and Park, P. (1999) 'Wavelet based watermarking method for digital images using the human visual system', Electronics Letters, Vol. 35, No. 6, March, pp.466-468.

Cited By

View all
  • (2013)Energy-aware distributed scheduling for multimedia streaming over Internet of ThingsInternational Journal of Ad Hoc and Ubiquitous Computing10.1504/IJAHUC.2013.05545513:3/4(176-186)Online publication date: 1-Jul-2013

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Ad Hoc and Ubiquitous Computing
International Journal of Ad Hoc and Ubiquitous Computing  Volume 4, Issue 1
December 2008
58 pages
ISSN:1743-8225
EISSN:1743-8233
Issue’s Table of Contents

Publisher

Inderscience Publishers

Geneva 15, Switzerland

Publication History

Published: 01 December 2009

Author Tags

  1. KFI
  2. common key agreement
  3. cryptography
  4. data hiding
  5. embedded systems
  6. encryption keys
  7. frequency domain watermarking
  8. key concealment
  9. key feature image
  10. public channel
  11. security
  12. symmetric key cryptosystem
  13. vision
  14. visual cryptography
  15. watermarks

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2013)Energy-aware distributed scheduling for multimedia streaming over Internet of ThingsInternational Journal of Ad Hoc and Ubiquitous Computing10.1504/IJAHUC.2013.05545513:3/4(176-186)Online publication date: 1-Jul-2013

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media