A Neoteric Copyright Protection Scheme employing Visual Cryptographic Techniques

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-25 Number-3
Year of Publication : 2015
Authors : T.Usha, P.Pardhasaradhi
  10.14445/22312803/IJCTT-V25P121

MLA

T.Usha, P.Pardhasaradhi "A Neoteric Copyright Protection Scheme employing Visual Cryptographic Techniques". International Journal of Computer Trends and Technology (IJCTT) V25(3):110-113, July 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Visual Cryptography is a special paradigm for cryptography schemes that allows the decoding of concealed images without any cryptographic computation. This paper proposes an interesting method for copyright protection for digital images based on visual cryptography. The proposed method having encoding of Most Significant bits of host image which is to be copyrighted, to generating a master image share. The master share is encoded with a secret image which is called copyright image to form another share called ownership share. The master share is placed in a central authority and ownership share is retained by the copyright owner. In case of any debate, the master shares and ownership shares can be stacked together to generate the secret image verifying the ownership about the host image. The important factor of our procedure is that we do not disturb the host image either during copyright generation or during copyright verification. Size of secret image is not a problem in the proposed method.

References
[1] Braudaway, G.W.: Protecting publicly-available images with an invisible image watermark. In: ICIP (1), pp. 524–527 (1997)
[2] Chang, C.C., Hsiao, J.Y., Yeh, J.C.: A colour image copyright protection scheme based on visual cryptography and discrete cosine transform. Imaging Sciences 50, 133–140 (2002)
[3] Podilchuk, C.I., Delp, E.J.: Digital watermarking: algorithms and applications. In: IEEE Signal Processing Magazine, pp. 33–46 (2001)
[4] Cox, I.J., Kilian, J., Thomson Leighton, F., Shamoon, T.: Secure spread spec-trum watermarking for multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)
[5] Hou, Y.-C., Chen, P.-M.: An asymmetric watermarking scheme based on vi-sual cryptography. In: 5th International Conference on Signal Processing, vol. 2, pp. 992–995 (2000)
[6] Hsu, C.S., Hou, Y.C.: Copyright protection scheme for digital images using visual cryptography and sampling methods. Optical Engineering 44(7), 1–9 (2005)
[7] Hwang, R.J.: A digital image copyright protection scheme based on visual cryp-tography. Tambang Journal of science and Engineering 3, 97–106 (2000)
[8] Low, S.H., Maxemchuk, N.F.: Performance comparison of two text marking meth-ods. IEEE Journal on Selected Areas in Communications 16, 561–572 (1998)
[9] Matsui, K., Ohnishi, J., Nakamura, Y.: Embedding a signature to pictures under wavelet transform. IEICE Trans. J79-D-II(6), 1017–1024 (1996)
[10] Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
[11] Parthasarathy, A., Kak, S.: An improved method of content based image water-marking. IEEE Transaction on broadcasting 53(2), 468–479 (2007)
[12] Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding: A survey. Proceedings of IEEE 87(7), 1062–1078 (1999)
[13] Wang, M.-S., Chen, W.-C.: Digital image copyright protection scheme based on visual cryptography and singular value decomposition. Optical Engineering 46, 67006 (2007).
[14] Amitava N, Jyoti P.S., Sushanta B, D Sarkar, Partha P.S.: A Novel Copyright Protection Scheme Using Visual Cryptography. Proceedings of ACC2011 part-II, CSIS 191, pp. 612-619. Springer- Verlag Berlin Heidelberg 2011.

Keywords
visual cryptography, copy-right protection, secret sharing, image processing, master share, ownership share.