134
Views
7
CrossRef citations to date
0
Altmetric
Articles

New Copyright Protection Scheme for Digital Images Based on Visual Cryptography

, &

REFERENCES

  • J. C. Patra, J. E. Phua and C. Bornand. (2010). “A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,” Elsevier Digit. Signal Process. 20 (6), pp. 1597–1611.
  • B. P. Devi, K. M. Singh and S. Roy. (2015). “A watermarking scheme for digital images based on visual cryptography,” Contemp. Eng. Sci. 8 (32), pp. 1517–1528.
  • B. P. Devi, K. M. Singh and S. Roy. (2016). “A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography,” SpringerPlus 5, 1091.
  • F. Petticolasand S. Katzenbeisser, Information Hiding Techniques for Steganography and Digital Watermarking. Boston, MA: Artech House Inc, 1999.
  • F. Hartung and M. Kutter. (1999). “Multimedia watermarking techniques,” Proc. IEEE 87 (7), pp. 1079–1107.
  • J. J. K. Ò. Ruanaidh and T. Pun. (1998). “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Elsevier Signal Process. 66 (3), pp. 303–317.
  • I. J. Cox and M. L. Miller. (2002). “The first 50 years electronic watermarking,” Eurasip J. Appl. Signal Process. 2, pp. 126–132.
  • C.-S. Hsu and Y. C. Hou. (2005). “Copyright protection scheme for digital images using visual cryptography and sampling methods,” Opt. Eng. 44 (7), pp. 077003-1–077003-10.
  • R. J. Hwang. (2000). “A digital image copyright protection scheme based on visual cryptography,” Tamkang J. Sci. Engg. 3 (2), pp. 97–106.
  • M. A. Hassan and M. A. Khalili. (2005). “Self watermarking based on visual cryptography,” World Acad. Sci. Eng. Technol. 8, pp. 159–162.
  • K. M. Singh. (2009). “Dual watermarking scheme for copyright protection,” IJCSES 3 (2), pp. 99–106.
  • D.-C. Lou, H.-K. Tso and J.-L. Liu. (2007). “A copyright protection scheme for digital images using visual cryptography technique,” Elsevier Comput. Stand. Int. 29 (1), pp. 125–131.
  • T. H. Chen, C. C. Chang, C. S. Wu and D. C. Lou. (2009). “On the security of a copyright protection scheme based on visual cryptography,” Elsevier Comput. Stand. Int. 31 (1), pp. 1–5.
  • S. Rawat and B. Raman. (2012). “A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion,” Elsevier AEU 66 (11), pp. 955–962.
  • M.-S. Wang and W.-C. Chen. (2007). “Digital image copyright protection scheme based on visual cryptography and singular value decomposition,” Optical Imaging 46 (6), pp. 067006-1–067006-8.
  • J.-M. Guo and H. Prasetyo. (2014). “False-positive-free SVD-based image watermarking,” Elsevier J. Vis. Commun. Image Represent. 25 (5), pp. 1149–1163.
  • Y. Wang, K.-W. Wong, X. Liao, T. Xiang and G. Chen. (2009). “A chaos-based image encryption algorithm with variable control parameters,” Elsevier Chaos Solitons Fractals 41 (4), pp. 1773–1783.
  • F. J. Dyson and H. Falk. (1992). “Period of a discrete cat mapping,” Amer. Math. Mon. 99 (7), pp. 603–614.
  • M. Naor and A. Shamir, “Visual cryptography,” In: A De Santis (eds), Advances in cryptography, Eurocrypt94, LNCS950. Berlin: Springer.
  • A. Karmakar, A. Phadikar, B. S. Phadikar and G. K. Maity. (2016). “A blind video watermarking scheme resistant to rotation and collusion attack,” Elsevier Comput. Inform. Sci. 28, pp. 199–210.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.