19
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

A copyright protection scheme of images based on visual cryptography

&
Pages 141-150 | Received 28 Dec 2000, Accepted 18 Jun 2001, Published online: 06 Oct 2016

REFERENCES

  • Bender, W., Gruhl, D., Morimoto N. and Lu, A. Technique for data hiding. IBM Syst. J., 1996, 35(3), 313–336.
  • Bors, A. G. and Pitas, I. Image watermarking using DCT domain constraint. IEEE International Conference on Image Processing (ICIP'96), 1996, Vol.3, pp. 231–234.
  • Chang, C. C. and Tsai, C. S. A technique for computing watermark from digital image. Int. J. Computing and Informatica, 2000, 24, 391–396.
  • Chang, C. C. and Hwang, K. F. A digital watermark scheme using human visual effects. Int. J. Computing and Informatica (to appear).
  • Chang, C. C, Chen, T. S. and Chung, P. F. A technique for copyright protection of digital images based upon (t, n)-threshold scheme. Int. J. Computing and Informatica (to appear).
  • Chen, T. S., Chang, C. C. and Hwang, M. S. A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image. Processing, 1998, 7(10), 1485–1488.
  • Cox, I. J., Kilian, J., Leighton, T. and Shamoon, T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing, December 1997, 6(12), 1073–1687.
  • Cox, I. J. and Linnartz, J. P. M. G. Some general methods for tampering with watermarks. IEEE J. Sel. Areas in Commun., May 1998, 16(4), 587–593.
  • Craver, S., Memon, N., Yeo, B. L. and Yeung, M. M. Resolving ownerships with invisible watermarking technique: limitations, attacks, and implication. IEEE J. Sel. Areas in Commun., 1998, 16(4), 573–586.
  • Hwang, M. S., Chang, C. C. and Hwang, K. F. A watermarking technique based on one-way hash functions. IEEE Trans. Consumer Electronics (to appear).
  • Hsu, C. T. and Wu, J. L. Hidden digital watermarks in images. IEEE Trans. Image Processing, January 1999, 8(1), 58–68.
  • Kutter, M., Jordan, F. and Bossen, F. Digital watermarking of color images using amplitude modulation. J. Electronic Imaging, April 1998, 7(2), 326–332.
  • Low, S. and Maxemchuk, N. Performance comparison of two text marking methods. IEEE J. Sel. Areas in Commun 1998, 16(4), 1017–1024.
  • Naor, N. and Shamir, A. Visual cryptography. In Advances in Cryptography: Eurocrypt ‘94, 1995, pp. 1–2 (Springer-Verlag, Berlin).
  • Obhuvhi, R., Masuda, H. and Aono, M. Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J. Sel. Areas in Commun., 1998, 16(4), 551–560.
  • Swason, M. D., Kobayashi, M. and Tewfik, A. H. Multimedia data embedding and watermarking techniques. Proc. IEEE, June 1998, 86(6), 1064–1087.
  • Voyatzis, G. and Pitas, I. Protection digital image copyrights: a framework. IEEE Computer Graphics and Applic., 1999, 1, 18–24.
  • Wolfgang, R. B. and Delp, E. J. An ownership for digital image. In Proceedings of 1996 International Conference on Image Processing, Lausanne, Switzerland, 16–19 September 1996, Vol. 3, pp. 219–222.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.